Image authentication using distributed arithmetic coding

被引:0
作者
Junwei Zhou
Fang Liu
Lee-Ming Cheng
机构
[1] Wuhan University of Technology,School of Computer Science and Technology
[2] City University of Hong Kong,Department of Electronic Engineering
来源
Multimedia Tools and Applications | 2018年 / 77卷
关键词
Security; Distributed arithmetic coding; Image authentication; Distributed source coding;
D O I
暂无
中图分类号
学科分类号
摘要
Image authentication using distributed arithmetic coding (DAC) is studied in this paper. The quantized random projections of the original image are compressed by a DAC encoder and the codeword is taken as the authentication data. With the help of a target image as side information, the DAC decoder could recover the projections. The authentication process is achieved by examining the Euclidean distance between the reconstructed projections and the side information. Compared with existing approaches, the proposed approach has a simpler structure without the help of an additional cryptographic hash function to verify the decoding result. Moreover, the authentication data is more compact with fewer size. Simulation results justify that the proposed approach achieves a comparable performance as existing schemes.
引用
收藏
页码:15505 / 15520
页数:15
相关论文
共 65 条
[1]  
Choi K-C(2016)Robust lossless digital watermarking using integer transform with Bit plane manipulation Multimed Tool Appl 75 6621-6645
[2]  
Pun C-M(2016)Perceptual image hashing using center-symmetric local binary patterns Multimed Tool Appl 75 4639-4667
[3]  
Davarzani R(2009)Digital image forensics IEEE Signal Proc Mag 26 26-37
[4]  
Mozaffari S(2005)Distributed video coding Proc IEEE 93 71-83
[5]  
Yaghmaie K(2008)Rate-compatible distributed arithmetic coding IEEE Commun Lett 12 575-577
[6]  
Fridrich J(2009)Distributed arithmetic coding for the slepian-Wolf problem IEEE Trans Signal Process 57 2245-2257
[7]  
Girod B(2015)Decoder side information generation techniques in Wyner-Ziv video coding: a review Multimed Tool Appl 74 1777-1803
[8]  
Margot A(1987)Elliptic curve cryptosystems Math Comput 48 203-209
[9]  
Rane S(2012)Image authentication using distributed source coding IEEE Trans Image Process 21 273-283
[10]  
Rebollo-Monedero D(2016)Robust image hashing with tampering recovery capability via low-rank and sparse representation Multimed Tool Appl 75 7681-7696