CFP last date
20 January 2025
Reseach Article

Implementation of Technique for Image Authentication using Regular LDPC Codes

by Imran Ali Khan, Bhanu Pratap Singh Sengar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 4
Year of Publication: 2013
Authors: Imran Ali Khan, Bhanu Pratap Singh Sengar
10.5120/11383-6662

Imran Ali Khan, Bhanu Pratap Singh Sengar . Implementation of Technique for Image Authentication using Regular LDPC Codes. International Journal of Computer Applications. 67, 4 ( April 2013), 14-18. DOI=10.5120/11383-6662

@article{ 10.5120/11383-6662,
author = { Imran Ali Khan, Bhanu Pratap Singh Sengar },
title = { Implementation of Technique for Image Authentication using Regular LDPC Codes },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 4 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number4/11383-6662/ },
doi = { 10.5120/11383-6662 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:46.562630+05:30
%A Imran Ali Khan
%A Bhanu Pratap Singh Sengar
%T Implementation of Technique for Image Authentication using Regular LDPC Codes
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 4
%P 14-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we propose an approach using encryption technique and LDPC source coding for the image authentication problem. Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original image might exist. In addition, intermediaries might tamper with the contents. Distinguishing legitimate diversity from malicious manipulations is the challenge addressed in this research. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data which is again encrypted using a secret key cryptography before ready to send. This can be correctly decoded with the help of an authentic image as side information. This mechanism provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization (EM) algorithms can authenticate images which have undergone contrast, brightness and even warping adjustments. Our novel authentication system also others tampering localization by using inference over a factor graph that represents tampering models.

References
  1. J. Fridrich, D. Soukal, and J. Luk´a?s, "Detection of copy move forgery in digital images," in Proceedings of Digital Forensic Research Workshop, August 2003.
  2. A. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Tech. Rep. TR2004-515, Department of Computer Science, Dartmouth College, 2004.
  3. Z. Lin, R. Wang, X. Tang, and H. -V. Shum, "Detecting doctored images using camera response normality and consistency," in Computer Vision and Pattern Recognition, (San Diego, CA), 2005.
  4. M. Johnson and H. Farid, "Exposing digital forgeries in complex lighting environments," IEEE Transactions on Information Forensics and Security 3(2), pp. 450–461, 2007.
  5. J. Luk´a?s, J. Fridrich, and M. Goljan, "Digital camera identi?cation from sensor noise," IEEE Transactions on Information Security and Forensics 1(2), pp. 205–214, 2006.
  6. Gallager, R. G. , "Low Density Parity Check Codes, Monograph", M. I. T. Press, 1963
  7. H. Farid, "Image forgery detection," IEEE Signal Process. Mag. , vol. 26, no. 2, pp. 16–25, Mar. 2009.
  8. A. Popescu andH. Farid, "Exposing digital forgeries in color ?lter array interpolated images," I EEE Trans. Signal Process. , vol. 53, no. 10, pp. 3948–3959, Oct. 2005.
  9. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure sprectrum watermarking for images, audio and video," in Proc. I Conf. Image Process. , Lausanne, Switzerland, Sep. 1996.
  10. R. B. Wolfgang and E. J. Delp, "A watermark for digital images," in Proc. IEEE Int. Conf. Image Process. , Lausanne, Switzerland, Sep. 1996
  11. Yao-Chung Lin, David Varodayan, "Image Authentication Using Distributed Source Coding" In IEEE Transactions On Image Processing, Vol. 21, No. 1, January 2012, Pp. 273-283
  12. W. Dif?e and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644–654, Jan. 1976.
  13. C. -Y. Lin and S. -F. Chang, "Generating robust digital signature for image/video authentication," in ACM Multimedia: Multimedia and Security Workshop, Bristol, U. K. , Sep. 1998, pp. 49–54.
  14. M. Schlauweg, D. Pröfrock, and E. Müller, "JPEG2000-based secure image authentication," in Workshop on Multimedia and Security, Geneva, Switzerland, 2006, pp. 62–67.
  15. M. Schneider and S. -F. Chang, "A robust content based digital signature for image authentication," in Proc. IEEE Int. Conf. Image Process. , Sep. 1996, vol. 3, pp. 227–230.
  16. J. Fridrich, "Robust bit extraction from images," in Int. Conf. Multimedia Computing and Syst. , Jul. 1999, vol. 2, pp. 536–540.
  17. D. -C. Lou and J. -L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consumer Electronics, vol. 46, no. 1, pp. 31–39, Feb. 2000.
  18. L. Xie, G. R. Arce, and R. F. Graveman, "Approximate image message authentication codes," IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242–252, Jun. 2001.
  19. R. -X. Zhan, K. Y. Chau, Z. -M. Lu, B. -B. Liu, and W. H. Ip, "Robust image hashing for image authentication based on DCT-DWT composite domain," in Proc. IEEE Int. Conf. Intelligent Syst. Design and Application. , Nov. 2008, vol. 2, pp. 119–122.
  20. H. Zhang, H. Zhang, Q. Li, and X. Niu, "Predigest Watson's visual model as perceptual hashing method," in Int. Conf. Convergence and Hybrid Inf. Technol. , Nov. 2008, vol. 2, pp. 617–620.
  21. R. Venkatesan, S. -M. Koon,M. H. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Int. Conf. Image Process. , 2000, vol. 3, pp. 664–666.
  22. F. Lefebvre, J. Czyz, and B. Macq, "A robust soft hash algorithm for digital image signature," in Int. Conf. Multimedia and Expo, Baltimore, MD, 2003.
  23. H. -L. Zhang, C. -Q. Xiong, and G. -Z. Geng, "Content based image hashing robust to geometric transformations," in Proc. Int. Symp. Electronic Commerce and Security, May 2009, vol. 2, pp. 105–108.
  24. A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. Inf. Forensics and Security, vol. 1, no. 2, pp. 215–230, Jun. 2006.
  25. C. De Roover, C. DeVleeschouwer, F. Lefebvre, and B. Macq, "Robust video hashing based on radial projections of key frames," IEEE Trans. Signal Process. , vol. 53, no. 10, pp. 4020–4037, Oct. 2005.
  26. Z. Tang, S. Wang, X. Zhang, andW. Wei, "Perceptual similarity metric resilient to rotation for application in robust image hashing," in Proc. Int. Conf. Multimedia and Ubiquitous Eng. , Jun. 2009, pp. 183–188.
  27. V. Monga and B. L. Evans, "Perceptual image hashing via feature points: Performance evaluation and tradeoffs," IEEE Trans. Image Process. , vol. 15, no. 11, pp. 3452–3465, Nov. 2006.
  28. M. Schlauweg and E. Müller, "Gaussian scale-space features for semi-fragile image authentication," in Proc. Picture Coding Symp. , May 2009, pp. 1–4.
  29. E Kee, H Farid, "Digital Image authentication from thumbnails" In SPIE symposium on electronic imaging, San Jose, CA, 2010
  30. M. Tagliaasacchi, G. Valensize, and S. Tubaro, "Hash Based identification of spase image tampering", IEEE trans, image process, vol. 18 no. 11, pp. 2491-2504, Nov. 2009.
  31. Imran A khan, "An overview to the proposed technique for image authentication using LDPC codes", IJCST Vol. 4, Jan 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Image Security Image digest image authentication digital image processing