Skip to main content
Log in

Improved Tampering Detection for Image Authentication Based on Image Partitioning

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper proposes an improved tampering detection algorithm for image authentication, using distributed source coding (DSC) principle, by partitioning the image into N equal clusters, for Slepian-Wolf coding. The proposed DSC based technique for authentication, models the magnitude variation in pixel domain generated by acceptable distortion and illegal tampering as Normal distributions with small and large variances respectively. DSC coding is done for the feature vectors derived from the partitioned image. The feature extraction algorithm is revamped in the aim to produce feature vectors with statistical features well matched to low density parity check (LDPC) codes, designed for the binary symmetric channel (BSC), as the design of LDPC codes for the BSC is intensely investigated and also a well understood topic. The results reveal that, the proposed scheme’s tampering detection is superior than the earlier DSC based techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. IEEE International Conference on Image Processing, Chicago, 1, 4–7.

    Google Scholar 

  2. Cox, I. J., Kilian, J., Leighton, T., & Shamoon, T. (1996). Secure spread spectrum watermarking for images, audio and video. Proceedings of IEEE International Conference on Image Processing, Lausanne, 3, 243–246.

    Article  Google Scholar 

  3. Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt lake City, UT, 3, 1977–1980.

    Google Scholar 

  4. Wolfgang, R. B., & Delp, E. J. (1996). A watermark for digital images. Proceedings of IEEE International Conference on Image Processing ICASSP, Lausanne, 3, 219–222.

    Article  Google Scholar 

  5. Barni, M., Bartolini, F., Manetti, A., & Piva, A. (2001). A data hiding approach for correcting errors in h.263 video transmitted over a noisy channel. In Proceedings of MMSP01, IEEE workshop on multimedia signal processing, Cannes, pp. 65–70.

  6. Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences, 28(2), 270–299.

    Article  MathSciNet  MATH  Google Scholar 

  7. Fridrich, J. (2000). Visual hash for oblivious watermarking. In Proceedings of SPIE, security and watermarking of multimedia contents II, San Jose, California, USA, pp. 286–294.

  8. Mihcak, M. K., & Venkatesan, R. (2001).Video watermarking using image hashing. Microsoft Research Technical Report.

  9. Ozer, H., Sankur, B., Memon, N., & Anarim, E. (2005). Perceptual audio hashing functions. EURASIP Journal on Applied Signal Processing, 12, 1780–1793.

    Article  Google Scholar 

  10. Swaminathan, A., Mao, Y., & Wu, M. (2006). Robust and secure image hashing. IEEE Transactions on Information Forensics and Security, 1(2), 215–230.

    Article  Google Scholar 

  11. Mihcak, K., Venkatesan, R., & Liu, T. (2005). Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. ACM Multimedia Systems Journal, 11(2), 185–200.

    Article  Google Scholar 

  12. Monga, V., & Evans, B. L. (2006). Perceptual image hashing via feature points performance evaluation and trade-offs. IEEE Transactions on Image Processing, 15(11), 3452–3465.

    Article  Google Scholar 

  13. Schneider, M., & Chang, S. (1996). Robust content based digital signature for image authentication. In Proceedings of IEEE international. Conference on image processing, (3), Lausanne, pp. 227–230.

  14. Kailasanathan, C., & Safavi Naini, R. (2001). Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation. In Proceedings of IEEE-EURASIP Work. Nonlinear sig. and image processing.

  15. Venkatesan, R., Koon, S.-M., Jakubowski, M. H., & Moulin, P. (2000). Robust image hashing. Proceedings of IEEE International Conference on. Image Processing, 3, 664–666.

    Article  Google Scholar 

  16. Lin, C. Y., & Chang, S. F. (2001). A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2), 153–168.

    Article  MathSciNet  MATH  Google Scholar 

  17. Lin, C. Y., & Chang, S. F. (1998). A robust image authentication method surviving JPEG lossy compression. In SPIE conference on storage and retrieval for image and video database, San Jose, CA.

  18. Lee, J., & Won, C. S. (2000). A watermarking sequence using parities of error control coding for image authentication and correction. IEEE Transactions on Consumer Electronics, 46(2), 313–317.

    Article  MATH  Google Scholar 

  19. Noriega, J. A. M., Kurkoski, B. M., Miyatake, M. N., & Meana, H. P. (2011). Image authentication and recovery using BCH Error-correcting codes. International Journal of Computers, 5(1), 26–33.

    Google Scholar 

  20. Lin, Y. C., Varodayan, D., & Girod, B. (2007). Image authentication based on distributed source coding, In IEEE international conference on image processing, San Antonio, TX, ICIP 2007, Vol.3, III-5-III8.

  21. Varodayan, D., Aaron, A., & Girod, B. (2006). Rate-adaptive codes for distributed source coding. EURASIP Signal Processing Journal, Special Section on Distributed Source Coding, 86(11), 3123–3130.

    Google Scholar 

  22. Lin, Y.-C., Varodayan, D., & Girod, B. (2007). Spatial models for localization of image tampering using distributed source codes. Picture Coding Symposium.

  23. Lin, Y.-C., Varodayan, D., & Girod, B. (2007). Image authentication and tampering localization using distributed source coding. IEEE Multimedia Signal Processing Workshop.

  24. Varodayan, D., Chen, David, Flierl, Markus, & Girod, Bernd. (2008). Wyner-Ziv coding of video with unsupervised motion vector learning. Signal Processing: Image Communication, 23(5), 369–378.

    MATH  Google Scholar 

  25. Lin, Y. C., Varodayan, D., & Girod, B. (2012). Image authentication using distributed source coding. IEEE Transactions on Image Processing, 21(1), 273–283.

    Article  MathSciNet  Google Scholar 

  26. Slepian, D., & Wolf, J. K. (1973). Noiseless coding of correlated information sources. IEEE Transactions on Information Theory, 19(4), 471–480.

    Article  MathSciNet  Google Scholar 

  27. Liveris, A., Xiong, Z., & Georghiades, C. (2002). Compression of binary sources with side information at the decoder using LDPC codes. IEEE Communications Letters, 6(10), 440–442.

    Article  Google Scholar 

  28. Chen, J., He, D., & Jagmohan, A. (2006). Slepian-Wolf code design via source-channel correspondence (pp. 2433–2437). Seattle, WA: Proceedings of IEEE International Symposium on Information Theory.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. M. Masoodhu Banu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Masoodhu Banu, N.M., Sujatha, S. Improved Tampering Detection for Image Authentication Based on Image Partitioning. Wireless Pers Commun 84, 69–85 (2015). https://doi.org/10.1007/s11277-015-2594-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2594-9

Keywords

Navigation