IMAGE AUTHENTICATION TECHNIQUES

Post on 14-Oct-2014

147 views 0 download

Tags:

Transcript of IMAGE AUTHENTICATION TECHNIQUES

1

By:

Nitin Mathur

EC-B

Roll No. -76

ASeminar presentation

On IMAGE AUTHENTICATION TECHNIQUE

2

Image Authentication

• By data authentication we mean here a procedure capable of ensuring that data have not been tampered with and of indicating their true origin.

• There are two types of authentication schemes, which are-

1. Cryptographic data authentication.-

2. Watermarking-based authentication.

3

Cryptography

• a straight forward way to provide video authentication, namely through the joint use of asymmetric key encryption and the digital Hash function

• It has mainly two functions:-> Encryption-> Decryption

4

Encryption & Decryption

5

Cryptographic Data Authentication

6

Drawbacks of Cryptographic Authentication

• Knowledge of private key • Delay in transmission • High requirements of video camera

7

Watermarking

What is a “Digital Image Watermark”

1. pattern inserted into a digital image

2. may be unique to each copy, or be common to multiple copies

A given Watermark may be 1.Unique to each copy (e.g., to identify the intended recipient), or 2.Be common to multiple copies (e.g., to identify the document source)

8

Types of Watermarking

WATERMARKING

FRAGILE WATERMARKING

ROBUST WATERMARKING

INVISIBLEWATERMARKING

VISIBLE WATERMARKING

9

Requirements of Watermarks

1. The watermark must be difficult or impossible to remove

2. The watermark must survive image modifications that are common to typical image-processing applications

3. An invisible watermark should be imperceptible so as not to affect the experience of viewing the image.

10

Techniques of watermarking

• Spatial watermarking

• Frequency watermarking

-> by superimposing a symbol over an area of the picture.

-> be applied using color separation

-> applying a transforms like the Fast Fourier Transform (FFT), Discrete Cosine Transforms (DCT), Wavelet Transforms etc.

-> Watermark signal is applied to lower frequencies.

11

The FFT Watermarking

12

The Image Authentication Framework

• Watermark Embedding

13

The Image Authentication Framework

• Watermark Detection

14

ADVANTAGES

• Robustness to high quality lossy image compression.• Automatic discrimination between malicious and innocuous

manipulations.• Controllable visual deterioration of the VS sequence by

varying the watermark embedding power.

DISADVANTAGES

• Frame independent watermark can be easily found by comparative analysis of all image sequence •The detector should know the frame number in order to perform authenticity check.

15

THANK YOU