Localization of sparse image tampering via random projections

Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way. When the authentication check fails, it might be useful to localize the tampering in the spatial domain. This paper proposes an algorithm based on compressive sensing principles, which solves both the authentication and the localization problems. The encoder produces a hash using a small bit budget by quantizing a limited number of random projections of the authentic image. The decoder uses the hash to estimate the distortion between the original and the received image. In addition, if the attack is sparse, it can be also localized. In order to keep the size of the hash small, encoding/decoding takes advantage of distributed source codes. This paper also investigates experimentally the tradeoff between the rate allocated to the hash and the performance achieved in terms of tampering localization.

[1]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[2]  Bernd Girod,et al.  Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.

[3]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Bernd Girod,et al.  Spatial models for localization of image tampering using distributed source codes , 2007, PCS 2007.

[5]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[6]  E. Berg,et al.  In Pursuit of a Root , 2007 .

[7]  V. K. Zadiraka,et al.  Distribution density of scalar product of Gaussian vectors , 1972 .

[8]  Qibin Sun,et al.  Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.

[9]  E.J. Candes Compressive Sampling , 2022 .