Abstract

Image authentication has applications in security systems, photo forensics, and photo journalism. This paper presents an image authentication scheme using added signal-dependent noise. Imperceptible noise is embedded into the image at the time of acquisition according to the film grain noise model. During authentication, the image is divided into key-dependent overlapping blocks and the parameters of the embedded noise are extracted. The variance of the extracted parameters can be used to show the authenticity of an image. Test results indicate that the proposed algorithm is robust against content-preserving modifications such as JPEG compression and at the same time is capable of detecting malicious tampering.

Highlights

  • Due to the increasing popularity and accessibility of image manipulation softwares, digital manipulations of multimedia content have become difficult to detect

  • Most early digital watermarking schemes such as those based on spread-spectrum [1], discrete cosine transform (DCT) [2], and wavelet transform [3] can be defeated if small geometric distortions were introduced

  • Since the images might have gone through unavoidable modifications such as JPEG compression, additive noise and small geometric distortions that do not change the content of the images, recent algorithms have been focusing on the robustness of watermarking and signature generation schemes

Read more

Summary

INTRODUCTION

Due to the increasing popularity and accessibility of image manipulation softwares, digital manipulations of multimedia content have become difficult to detect. Recent digital signature schemes [7,8,9,10] based on extracting unique features from the images were robust against compression, noise, and distortions. They did not have good localization properties, and venerable against local distortions such as removal or insertion of foreign objects. Detecting digital forgeries without digital watermark or signature had been studied by Popescu and Farid [11, 12] Their idea was based on the fact that forgeries usually require interpolation and resampling of the insertion object.

Signal-dependent noise
Noise embedding
Image authentication
Experiment setup
Performance in content preserving modifications
Content-changing attacks
Security attacks
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call