We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Image Authentication System using LDPC and Watermarking Technique

by Ankit Bhatnagar, Jasvinder Pal Singh, Gaurav Shrivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 16
Year of Publication: 2013
Authors: Ankit Bhatnagar, Jasvinder Pal Singh, Gaurav Shrivastava
10.5120/12823-9876

Ankit Bhatnagar, Jasvinder Pal Singh, Gaurav Shrivastava . Image Authentication System using LDPC and Watermarking Technique. International Journal of Computer Applications. 73, 16 ( July 2013), 8-13. DOI=10.5120/12823-9876

@article{ 10.5120/12823-9876,
author = { Ankit Bhatnagar, Jasvinder Pal Singh, Gaurav Shrivastava },
title = { Image Authentication System using LDPC and Watermarking Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 16 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number16/12823-9876/ },
doi = { 10.5120/12823-9876 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:14.839064+05:30
%A Ankit Bhatnagar
%A Jasvinder Pal Singh
%A Gaurav Shrivastava
%T Image Authentication System using LDPC and Watermarking Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 16
%P 8-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days, the rate of using digital image is increasing exponentially because of its low cost and easy manipulation property. It is obvious that digital images captured from CCD cameras or other digital image devices have to be analyzed and determined before processing it, to keep the integrity and ensure the accuracy and reliability of the digital image. We need some sort of robust methods and standard procedures that guarantee and strengthen the authenticity of digital image. Image authentication is a technique that analyzes a digital image and determines whether it is altered or not. Image authentication technique is very useful for various organizations such as health care, law enforcement agencies and insurance sector etc. Image authentication is also important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Untrusted intermediaries might tamper the contents of image. Distinguishing the legitimate diversity of encodings from malicious manipulation is the challenge addressed in this paper. We developed a LDPC and watermark based new approach for image authentication. With the help of this approach we can authenticate images effectively. In our technique, we provide LDPC quantized image projection and the Encrypted image as authentication data. As well as watermark image that was embedded into original image to identify legitimate or illegitimate state of image authentication system. These data can be correctly decoded only with the help of an authentic image as side information. This technique provides the desired robustness against legitimate encoding alteration, while detecting illegitimate variations.

References
  1. Yao-Chung Lin, David Varodayan, Bernd Girod, "Image Authentication Using Distributed Source Coding", IEEE Transactions on Image Processing, vol. 21, no. 1, Jan. 2012.
  2. Nitin Khanna, Antoni Roca, George T. C. Chiu, Jan P. Allebach, Edward J. Delp "Improvements on Image Authentication and Recovery Using Distributed Source Coding". National Science Foundation, under Award Number 0524540,2009.
  3. H. Farid, "Image forgery detection", IEEE Signal Process. Mag. , vol. 26, no. 2, pp. 16–25, Mar. 2009.
  4. J. Lukas and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images", presented at the Digital Forensic Research Workshop, Cleveland, OH, Aug. 2003.
  5. A. Popescu and H. Farid, "Exposing digital forgeries in color filter array interpolated images", IEEE Trans. Signal Process. , vol. 53, no. 10, pp. 3948–3959, Oct. 2005.
  6. J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication", in IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt Lake City, UT, May 2001.
  7. R. B. Wolfgang and E. J. Delp, "A watermark for digital images", in IEEE International Conference on Image Processing, Lausanne, Switzerland, Sep. 1996.
  8. C. Y. Lin and S. F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Transcations on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153–168, Feb. 2001.
  9. C. S. Liu and H. Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme", IEEE Transcations on Multimedia, vol. 5, no. 2, pp. 161–173, June 2003.
  10. W. Diffie and M. E. Hellman, "New directions in cryptography", IEEE Transcations on Information Theory, vol. IT-22, no. 6, pp. 644–654, Jan. 1976.
  11. D. Slepian and J. Wolf, "Noiseless coding of correlated information sources", Information Theory, IEEE Transactions on, vol. 19, no. 4, pp. 471–480, Jul 1973.
  12. Y. C. Lin, D. Varodayan, and B. Girod, "Image authentication and tampering localization using distributed source coding", Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on, pp. 393–396,Oct. 2007.
  13. Y. C. Lin, D. Varodayan, T. Fink, E. Bellers, and B. Girod, "Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization," Proc. IEEE International Conference on Multimedia and Expo, ICME 2008, Hannover, Germany, June 2008.
  14. L. E. Baum, T. Petrie, G. Soules, and N. Weiss, "A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains", Annals of Mathematical Statistics 41, pp. 164–171, Oct. 1970.
  15. Angelos D. Liveris, Zixiang Xiong, Costas N. Georghiades, "Compression of Binary Sources With Side Information at the Decoder Using LDPC Codes", IEEE Communications Letters, vol. 6, no. 10, oct 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Image Authentication Low Density Parity Check (LDPC) Digital Watermarking