Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization

Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded...

Full description

Saved in:
Bibliographic Details
Published in2008 IEEE International Conference on Multimedia and Expo pp. 613 - 616
Main Authors Yao-Chung Lin, Varodayan, D., Fink, T., Bellers, E., Girod, B.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2008
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be inauthentic. An authentication decoder was supplied with a Slepian-Wolf encoded image projection as authentication data. We extend our scheme to authenticate contrast and brightness adjusted images using an expectation maximization algorithm. Experimental results demonstrate that the proposed algorithm can distinguish legitimate encodings of authentic contrast and brightness adjusted images from illegitimately modified versions using authentication data of about 100 bytes.
ISBN:1424425700
9781424425709
ISSN:1945-7871
1945-788X
DOI:10.1109/ICME.2008.4607509