scholarly journals Discriminating multiple JPEG compression using first digit features

Author(s):  
Simone Milani ◽  
Marco Tagliasacchi ◽  
Stefano Tubaro
Keyword(s):  
2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


Entropy ◽  
2021 ◽  
Vol 23 (4) ◽  
pp. 421
Author(s):  
Dariusz Puchala ◽  
Kamil Stokfiszewski ◽  
Mykhaylo Yatsymirskyy

In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used in connection with the JPEG compression standard. The image encryption process takes advantage of fast linear transforms parametrized with private keys and is carried out prior to the compression stage in a way that does not alter those statistical characteristics of the input image that are crucial from the point of view of the subsequent compression. This feature makes the encryption process transparent to the compression stage and enables the JPEG algorithm to maintain its full compression capabilities even though it operates on the encrypted image data. The main advantage of the considered approach is the fact that the JPEG algorithm can be used without any modifications as a part of the encrypt-then-compress image processing framework. The paper includes a detailed mathematical model of the examined scheme allowing for theoretical analysis of the impact of the image encryption step on the effectiveness of the compression process. The combinatorial and statistical analysis of the encryption process is also included and it allows to evaluate its cryptographic strength. In addition, the paper considers several practical use-case scenarios with different characteristics of the compression and encryption stages. The final part of the paper contains the additional results of the experimental studies regarding general effectiveness of the presented scheme. The results show that for a wide range of compression ratios the considered scheme performs comparably to the JPEG algorithm alone, that is, without the encryption stage, in terms of the quality measures of reconstructed images. Moreover, the results of statistical analysis as well as those obtained with generally approved quality measures of image cryptographic systems, prove high strength and efficiency of the scheme’s encryption stage.


Author(s):  
Ilia V. Safonov ◽  
Ilya V. Kurilin ◽  
Michael N. Rychagov ◽  
Ekaterina V. Tolstaya

2015 ◽  
Vol 41 ◽  
pp. 90-97 ◽  
Author(s):  
Jianquan Yang ◽  
Guopu Zhu ◽  
Jiwu Huang ◽  
Xi Zhao
Keyword(s):  

2002 ◽  
Vol 15 (1) ◽  
pp. 15-21 ◽  
Author(s):  
Kenneth R. Persons ◽  
Nicholas J. Hangiandreou ◽  
Nicholas T. Charboneau ◽  
J. William Charboneau ◽  
E. Meredith James ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document