Distortion bounded authentication techniques

被引:16
作者
Memon, N [1 ]
Vora, P [1 ]
Yeo, BL [1 ]
Yeung, M [1 ]
机构
[1] Polytech Univ, Dept Comp & Informat Sci, Brooklyn, NY 11201 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II | 2000年 / 3971卷
关键词
authentication; digital watermarks; digital signature; multimedia authentication; image authentication; fragile watermarks; distortion bounded authentication;
D O I
10.1117/12.384970
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Authentication techniques provide a means of ensuring the integrity of a message. The recent proliferation of multimedia content has led to a need for developing authentication mechanisms. Although, authentication techniques have been studied for many decades, multimedia authentication poses some new challenges. Perhaps the key such challenge being the need to authenticate multimedia content as opposed to its representation. In this paper, we review some of the techniques proposed in the literature for multimedia content authentication. We then proposes distortion bounded authentication techniques that give hard guarantees on the amount of distortion that will be tolerated before the multimedia object under consideration is deemed unauthentic. The basic idea behind distortion-bounded authentication is simple. Quantization is performed tin feature space) before authentication, thereby restricting image features in a known and deterministic manner. The same quantization is performed prior to verification. Distortions less than half the quantization step size will not affect the verification process and the content will be deemed authentic. The basic framework is simple and can be applied with many different techniques, distortion measures and feature sets. We give examples of distortion-bound authentication techniques using the L1 and L2 norms in pixel domain.
引用
收藏
页码:164 / 174
页数:11
相关论文
共 18 条
[1]  
BHATTACHARJEE S, 1998, P INT C IM P CHIC OC
[2]  
COPPERSMITH D, 1999, P SPIE IS T EL IM S
[3]  
COX IJ, 1997, P SPIE HUMAN VISIO 2, V3016
[4]  
FRIDRICH J, 2000, P SPIE IS T EL IM S
[5]  
FRIDRICH J, 1998, P INT C IM P CHIC OC
[6]  
*H PACK LAB, 1997, HPL9772
[7]  
HOLLIMAN M, 2000, IN PRESS IEEE T IMAG
[8]  
MEMON N, 1998, COMMUNICATIONS A JUL
[9]  
MEMON N, 1999, P IS T PICS S SAV GE
[10]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017