1 Image Authentication Under Image Authentication Under Geometric Attacks Via Structure Geometric Attacks Via Structure Matching Matching Vishal Monga, Divyanshu Vats and Vishal Monga, Divyanshu Vats and Brian L. Evans Brian L. Evans http:// signal.ece.utexas.edu Embedded Signal Processing Laboratory The University of Texas at Austin Austin, TX 78712-1084 USA {vishal, vats, bevans}@ece.utexas.edu 2005 IEEE Int. Conference on Multimedia and Expo July 6 th , 2005
24
Embed
Image Authentication Under Geometric Attacks Via Structure Matching
http://signal.ece.utexas.edu. 2005 IEEE Int. Conference on Multimedia and Expo. Image Authentication Under Geometric Attacks Via Structure Matching. Vishal Monga, Divyanshu Vats and Brian L. Evans. July 6 th , 2005. - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Image Authentication Under Geometric Image Authentication Under Geometric Attacks Via Structure MatchingAttacks Via Structure Matching
Vishal Monga, Divyanshu Vats and Vishal Monga, Divyanshu Vats and Brian L. EvansBrian L. Evans
http://signal.ece.utexas.edu
Embedded Signal Processing LaboratoryThe University of Texas at AustinAustin, TX 78712-1084 USA{vishal, vats, bevans}@ece.utexas.edu
2005 IEEE Int. Conference on Multimedia and Expo
July 6th , 2005
2
The Problem of Robust Image AuthenticationThe Problem of Robust Image AuthenticationIntroduction
• Given an image– Make a binary decision on the authenticity of content– Content : defined (rather loosely) as the information
conveyed by the image, e.g. one-bit change or small degradation in quality is NOT a content change
– Robust authentication system: required to tolerate incidental modifications yet be sensitive to content changes
• Two classes of media verification methods– Watermarking: Look for pre-embedded information to
determine authenticity of content– Digital Signatures: feature extraction; a significant change
in the signature (image features) indicates a content change
3
Introduction
Geometric Distortions or AttacksGeometric Distortions or Attacks
• Motivation to study geometric attacks– Vulnerability of classical watermarking/signature schemes– Loss of synchronization in watermarking
Original Shearing Random bending
Global Local• Classification of geometric distortions
4
Related WorkRelated Work• Geometric distortion resistant watermarking
– Periodic insertion of the mark [Kalker et. al, 1999 ] [Kutter et. al, 1998 ]