TY - GEN
T1 - Image authentication under geometric attacks via structure matching
AU - Monga, Vishal
AU - Vats, Divyanshu
AU - Evans, Brian L.
PY - 2005
Y1 - 2005
N2 - Surviving geometric attacks in image authentication is considered to be of great importance. This is because of the vulnerability of classical watermarking and digital signature based schemes to geometric image manipulations, particularly local geometric attacks. In this paper, we present a general framework for image content authentication using salient feature points. We first develop an iterative feature detector based on an explicit modeling of the human visual system. Then, we compare features from two images by developing a generalized Hausdorff distance measure. The use of such a distance measure is crucial to the robustness of the scheme, and accounts for feature detector failure or occlusion, which previously proposed methods do not address. The proposed algorithm withstands standard benchmark (e.g. Stirmark) attacks including compression, common signal processing operations, global as well as local geometric transformations, and even hard to model distortions such as print and scan. Content changing (malicious) manipulations of image data are also accurately detected.
AB - Surviving geometric attacks in image authentication is considered to be of great importance. This is because of the vulnerability of classical watermarking and digital signature based schemes to geometric image manipulations, particularly local geometric attacks. In this paper, we present a general framework for image content authentication using salient feature points. We first develop an iterative feature detector based on an explicit modeling of the human visual system. Then, we compare features from two images by developing a generalized Hausdorff distance measure. The use of such a distance measure is crucial to the robustness of the scheme, and accounts for feature detector failure or occlusion, which previously proposed methods do not address. The proposed algorithm withstands standard benchmark (e.g. Stirmark) attacks including compression, common signal processing operations, global as well as local geometric transformations, and even hard to model distortions such as print and scan. Content changing (malicious) manipulations of image data are also accurately detected.
UR - https://www.scopus.com/pages/publications/33747375321
UR - https://www.scopus.com/pages/publications/33747375321#tab=citedBy
U2 - 10.1109/ICME.2005.1521402
DO - 10.1109/ICME.2005.1521402
M3 - Conference contribution
AN - SCOPUS:33747375321
SN - 0780393325
SN - 9780780393325
T3 - IEEE International Conference on Multimedia and Expo, ICME 2005
SP - 229
EP - 232
BT - IEEE International Conference on Multimedia and Expo, ICME 2005
T2 - IEEE International Conference on Multimedia and Expo, ICME 2005
Y2 - 6 July 2005 through 8 July 2005
ER -