Authentication of digital images and video: Generic models and a new contribution

被引:39
作者
Queluz, MP [1 ]
机构
[1] Univ Tecn Lisboa, Inst Telecommun, Inst Super Tecn, P-1049001 Lisbon, Portugal
关键词
content authentication; labeling; watermarking;
D O I
10.1016/S0923-5965(00)00010-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is focused on digital image and video authentication, considered as the process of evaluating the integrity of image contents relative to the original picture and of being able to detect, in an automatic way, malevolent content modifications. Generic models, corresponding to current approaches for content integrity evaluation - labeling and watermarking - are described, providing a common basis to compare existing techniques. Two labeling implementations are put forward. The first one is based on second-order image moments. It can be thought of as a low-level approach, where the emphasis is put on computational simplicity. The second one relies on image edges and tackles the problem of image/video integrity evaluation from a semantic, higher-level point of view. The viability of both methods, as a means of protecting the content, is assessed under JPEG and MPEG2 compression and non-authorized image modifications. (C) 2001 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:461 / 475
页数:15
相关论文
共 20 条
[1]  
Delaigle J.-F., 1996, Proceedings of the European Conference on Multimedia Applications, Services and Techniques, P711
[2]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[3]  
ERNY MF, 1996, AC019THORGSDRPD30B1
[4]  
Fridrich J, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P404, DOI 10.1109/ICIP.1998.723401
[5]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[6]  
Kundur D, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P409, DOI 10.1109/ICIP.1998.723403
[7]  
LAMBRECHT CJV, 1996, THESIS
[8]  
LIN CY, 1998, P IS T SPIE S EL IM
[9]   CRYPTOLOGY FOR DIGITAL TV BROADCASTING [J].
MACQ, BM ;
QUISQUATER, JJ .
PROCEEDINGS OF THE IEEE, 1995, 83 (06) :944-957
[10]   THRESHOLD SELECTION METHOD FROM GRAY-LEVEL HISTOGRAMS [J].
OTSU, N .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1979, 9 (01) :62-66