150 likes | 171 Views
Robust Image Authentication Using Content Based Compression. Source: ACM Multimedia Systems, Vol.9, August 2003, page 121-130 Authors: Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu Speaker: Kuo-Wei Weng Date: 2005/05/03.
E N D
Robust Image Authentication Using Content Based Compression Source:ACM Multimedia Systems, Vol.9, August 2003, page 121-130 Authors: Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu Speaker:Kuo-Wei Weng Date: 2005/05/03
Outline • Introduction • Creation of signature • Authentication • Conclusion
Introduction Permissible operations:global operations Ex:resizing , JPEG compression Malefic tampering:localized operations Ex:Cropping , alteration
Introduction Cont’ I0 +signature I A B
Creation of signature Find Feature points Weighting Function (W) Compression Data (S) Signature (S,W)
Creation of signature Cont’ Content-based: Salient points Weighting function
Creation of signature Cont’ Weighting function w: α:rate of resolution falls off γ:foveal location β:foveal resolution
Creation of signature Cont’ Foveated image: (with the center of the right eye as the fovea)
Creation of signature Cont’ Compression Image: Uniform resolution image Foveated image
Creation of signature Cont’ DWT(Discrete Wavelet Transformation)
Creation of signature Cont’ Compression image
Authentication Receive I and signature Extract Compression Image Authentication
Authentication Cont’ Where I0 is the original image I is the receive of image
Conclusion • Important content information is not uniformly • distributed across the image and that illegal • operations are usually localized while permissible • operations are global in nature.