Theme-Logo
  • Login
  • Home
  • Course
  • Publication
  • Theses
  • Reports
  • Published books
  • Workshops / Conferences
  • Supervised PhD
  • Supervised MSc
  • Supervised projects
  • Education
  • Language skills
  • Positions
  • Memberships and awards
  • Committees
  • Experience
  • Scientific activites
  • In links
  • Outgoinglinks
  • News
  • Gallery
publication name “A Secure Semi-Fragile JPEG Image Authentication Scheme Based On Discrete Cosine Transform,” International Computer Conference ICC 2009, University of California, Fullerton
Authors Mona F.M. Mursi, Ghazy M.R. Assassa, Hatim Aboalsamh , Khaled Alghathbar
year 2009
keywords
journal
volume Not Available
issue Not Available
pages Not Available
publisher Not Available
Local/International International
Paper Link http://www.fullerton.edu/icc2009/program.html
Full paper download
Supplementary materials Not Available
Abstract

The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that remains tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that utilizes a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the frequency domain, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the integrity and authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. The experimental results demonstrate that the proposed algorithm has the advantages such as simple computation complexity, security , and good robustness to JPEG compression, and efficient detection of tampering, as well as good tolerance to noise.

Benha University © 2023 Designed and developed by portal team - Benha University