Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded...
Saved in:
Published in | 2008 IEEE International Conference on Multimedia and Expo pp. 613 - 616 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2008
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be inauthentic. An authentication decoder was supplied with a Slepian-Wolf encoded image projection as authentication data. We extend our scheme to authenticate contrast and brightness adjusted images using an expectation maximization algorithm. Experimental results demonstrate that the proposed algorithm can distinguish legitimate encodings of authentic contrast and brightness adjusted images from illegitimately modified versions using authentication data of about 100 bytes. |
---|---|
ISBN: | 1424425700 9781424425709 |
ISSN: | 1945-7871 1945-788X |
DOI: | 10.1109/ICME.2008.4607509 |