Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19] [ 20]

@

Journal of Information Science and Engineering, Vol. 23 No. 2, pp. 511-524 (March 2007)

Toward a Robust Image Authentication Method Surviving JPEG Lossy Compression

Chien-Chang Chen and Cheng-Shian Lin
Department of Computer Science
Hsuan Chuang University
Hsinchu, 300 Taiwan
E-mail: cchen34@hcu.edu.tw

This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and predefined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. The message calculation and embedding procedure are based on two proposed quantization properties that always exist under different JPEG quantization tables. Therefore, the proposed image authentication approach can tolerate JPEG compression efficiently. Experimental results demonstrate the effectiveness of the proposed image authentication approach.

Keywords: image authentication, discrete cosine transform (DCT), JPEG quantization, quantization sum invariant property, further quantization property

Full Text () Retrieve PDF document (200703_10.pdf)

Received March 28, 2005; revised June 13 & August 23, 2005; accepted September 21, 2005.
Communicated by H. Y. Mark Liao.