Image authentication and tampering localization using distributed source coding

Yao Chung Lin, David Varodayan, Bernd Girod

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding to distinguish the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian-Wolf encoded lossy version of the image as authentication data. Distributed source coding provided the desired robustness against legitimate encoding variations, while detecting illegitimate modification. We augment the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder requires only incremental localization data beyond the authentication data since we use rate-adaptive distributed source codes. Both decoders perform joint bitplane decoding, rather than conditional bitplane decoding. Our results demonstrate that tampered image blocks can be identified with high probability using authentication plus localization data of only a few hundred bytes for a 512×512 image.

Original languageEnglish (US)
Title of host publication2007 IEEE 9Th International Workshop on Multimedia Signal Processing, MMSP 2007 - Proceedings
Pages393-396
Number of pages4
DOIs
StatePublished - 2007
Event2007 IEEE 9Th International Workshop on Multimedia Signal Processing, MMSP 2007 - Chania, Crete, Greece
Duration: Oct 1 2007Oct 3 2007

Publication series

Name2007 IEEE 9Th International Workshop on Multimedia Signal Processing, MMSP 2007 - Proceedings

Other

Other2007 IEEE 9Th International Workshop on Multimedia Signal Processing, MMSP 2007
CountryGreece
CityChania, Crete
Period10/1/0710/3/07

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Signal Processing

Fingerprint Dive into the research topics of 'Image authentication and tampering localization using distributed source coding'. Together they form a unique fingerprint.

Cite this