Generating Robust Digital Signature for Image/Video Authentication

Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video authentication method that generates robust signatures for compressed video. The signatures can survive some of the transcoding process of MPEG.

[1]  John P. Oakley,et al.  Storage and Retrieval for Image and Video Databases , 1993 .

[2]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[3]  David Bearman,et al.  Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process , 1998, D Lib Mag..

[4]  Marc Joye,et al.  Practical solution to authentication of images with a secure camera , 1997, Electronic Imaging.

[5]  Shih-Fu Chang,et al.  Tools for compressed-domain video indexing and editing , 1996, Electronic Imaging.

[6]  C.-H. Lin,et al.  An Image Authenticator Surviving DCT-based Variable Quantization Table Compression , 1997 .

[7]  Stephen Jacobs,et al.  Straming Video using Dynamic Rate Shaping and TCP Flow Control , 1998 .

[8]  Hugo Krawczyk,et al.  RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.

[9]  P. N. Tudor,et al.  Real-time transcoding of MPEG-2 video bit streams , 1997 .

[10]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[11]  Cesar A. Gonzales,et al.  Video compression algorithm with adaptive bit allocation and quantization , 1991, Other Conferences.

[12]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[13]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[14]  Wei Ding,et al.  Rate control of MPEG video coding and recording by rate-quantization modeling , 1996, IEEE Trans. Circuits Syst. Video Technol..

[15]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[16]  Shih-Fu Chang,et al.  Embedding visible video watermarks in the compressed domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[17]  Shih-Fu Chang,et al.  CVEPS - a compressed video editing and parsing system , 1997, MULTIMEDIA '96.

[18]  Alexandros Eleftheriadis,et al.  Constrained and general dynamic rate shaping of compressed digital video , 1995, Proceedings., International Conference on Image Processing.

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Shih-Fu Chang,et al.  Manipulation and Compositing of MC-DCT Compressed Video , 1995, IEEE J. Sel. Areas Commun..

[21]  Arun N. Netravali,et al.  Digital Video: An introduction to MPEG-2 , 1996 .

[22]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[23]  P. J. Brightwell,et al.  Flexible switching and editing of MPEG-2 video bitstreams , 1997 .

[24]  Oliver Werner,et al.  Generic Quantiser for Transcoding of Hybrid Video , 1997 .