SELF RECOVERY AUTHENTICATION OF IMAGES IN THE DWT DOMAIN

2005 ◽  
Vol 05 (01) ◽  
pp. 149-165 ◽  
Author(s):  
ALESSANDRO PIVA ◽  
FRANCO BARTOLINI ◽  
ROBERTO CALDELLI

The interest for multimedia contents authentication has recently increased. In particular watermarking-based authentication schemes seem to be offering some advantages with respect to classical cryptography tools (e.g. real content authentication, localization of manipulations, storage format independence, transparency to common signal processing, etc.). In this paper a simple and secure self recovery authentication algorithm which hides an image digest into some DWT subbands of the to be authenticated image is presented. This technique has been designed for video surveillance and/or remote sensing applications. The main goal of this approach is to detect possible malevolent object manipulations undergone by the image (object replacing and/or deletion) by means of a self recovery processing. This valuable characteristic has to be maintained also when an image is processed through an usual and friendly transformation like JPEG compression. Particular care is given to make the scheme robust against innocuous manipulations, and secure against forgery attempts. Experimental results are presented that demonstrate the good performance of the proposed system.

1986 ◽  
Vol 1 (4) ◽  
pp. 3-15 ◽  
Author(s):  
Deborah A. Kuchler ◽  
David L.B. Jupp ◽  
Daniel B. van R. Claasen ◽  
William Bour

1997 ◽  
Vol 08 (01) ◽  
pp. 179-231 ◽  
Author(s):  
Alistair Moffat ◽  
Timothy C. Bell ◽  
Ian H. Witten

Most data that is inherently discrete needs to be compressed in such a way that it can be recovered exactly, without any loss. Examples include text of all kinds, experimental results, and statistical databases. Other forms of data may need to be stored exactly, such as images—particularly bilevel ones, or ones arising in medical and remote-sensing applications, or ones that may be required to be certified true for legal reasons. Moreover, during the process of lossy compression, many occasions for lossless compression of coefficients or other information arise. This paper surveys techniques for lossless compression. The process of compression can be broken down into modeling and coding. We provide an extensive discussion of coding techniques, and then introduce methods of modeling that are appropriate for text and images. Standard methods used in popular utilities (in the case of text) and international standards (in the case of images) are described.


Sign in / Sign up

Export Citation Format

Share Document