Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization

Yao Chung Lin, David Varodayan, Torsten Fink, Erwin Betters, Bernd Girod

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be inauthentic. An authentication decoder was supplied with a Slepian-Wolf encoded image projection as authentication data. We extend our scheme to authenticate contrast and brightness adjusted images using an Expectation Maximization algorithm. Experimental results demonstrate that the proposed algorithm can distinguish legitimate encodings of authentic contrast and brightness adjusted images from illegitimately modified versions using authentication data of about 100 bytes.

Original languageEnglish (US)
Title of host publication2008 IEEE International Conference on Multimedia and Expo, ICME 2008 - Proceedings
Pages613-616
Number of pages4
DOIs
StatePublished - 2008
Event2008 IEEE International Conference on Multimedia and Expo, ICME 2008 - Hannover, Germany
Duration: Jun 23 2008Jun 26 2008

Publication series

Name2008 IEEE International Conference on Multimedia and Expo, ICME 2008 - Proceedings

Other

Other2008 IEEE International Conference on Multimedia and Expo, ICME 2008
CountryGermany
CityHannover
Period6/23/086/26/08

Keywords

  • Distributed source coding
  • Expectation Maximization
  • Image authentication

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization'. Together they form a unique fingerprint.

Cite this