Image authentication using distributed source coding

We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 21(2012), 1 vom: 15. Jan., Seite 273-83
1. Verfasser: Lin, Yao-Chung (VerfasserIn)
Weitere Verfasser: Varodayan, David, Girod, Bernd
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2012
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Journal Article
LEADER 01000naa a22002652 4500
001 NLM208591133
003 DE-627
005 20231224004250.0
007 cr uuu---uuuuu
008 231224s2012 xx |||||o 00| ||eng c
024 7 |a 10.1109/TIP.2011.2157515  |2 doi 
028 5 2 |a pubmed24n0695.xml 
035 |a (DE-627)NLM208591133 
035 |a (NLM)21609882 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Lin, Yao-Chung  |e verfasserin  |4 aut 
245 1 0 |a Image authentication using distributed source coding 
264 1 |c 2012 
336 |a Text  |b txt  |2 rdacontent 
337 |a ƒaComputermedien  |b c  |2 rdamedia 
338 |a ƒa Online-Ressource  |b cr  |2 rdacarrier 
500 |a Date Completed 04.04.2012 
500 |a Date Revised 21.12.2011 
500 |a published: Print-Electronic 
500 |a Citation Status MEDLINE 
520 |a We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm 
650 4 |a Journal Article 
700 1 |a Varodayan, David  |e verfasserin  |4 aut 
700 1 |a Girod, Bernd  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 21(2012), 1 vom: 15. Jan., Seite 273-83  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnns 
773 1 8 |g volume:21  |g year:2012  |g number:1  |g day:15  |g month:01  |g pages:273-83 
856 4 0 |u http://dx.doi.org/10.1109/TIP.2011.2157515  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 21  |j 2012  |e 1  |b 15  |c 01  |h 273-83