IEEE Int. Conf. on Multimedia & Expo,
July 6-8, 2005, pp. 229-232, Amsterdam, The Netherlands.
Image Authentications Under Geometric Attacks Via Structure Matching
Vishal Monga,
Divyanshu Vats, and
Brian L. Evans
Embedded Signal
Processing Laboratory,
Center for Perceptual Systems,
The University of Texas at Austin,
Austin, TX 78712 USA
Vishal.Monga@xeroxlabs.com -
vats@ece.utexas.edu -
bevans@ece.utexas.edu
Paper -
Images from Paper -
Presentation Slides -
Software
Image Hashing Research
at UT Austin
Abstract
Surviving geometric attacks in image authentication is considered
to be of great importance.
This is because of the vulnerability of classical watermarking and
digital signature based schemes to geometric image manipulations,
particularly local geometric attacks.
In this paper, we present a general framework for image content
authentication using salient feature points.
We first develop an iterative feature detector based on an explicit
modeling of the human visual system.
Then, we compare features from two images by developing a generalized
Hausdorff distance measure.
The use of such a distance measure is crucial to the robustness of
the scheme, and accounts for feature detector failure or occlusion,
which previously proposed methods do not address.
The proposed algorithm withstands standard benchmark (e.g. Stirmark)
attacks including compression, common signal processing operations,
global as well as local geometric transformations, and even hard to
model distortions such as print and scan.
Content changing (malicious) manipulations of image data are also
accurately detected.
COPYRIGHT NOTICE: All the documents on this server
have been submitted by their authors to scholarly journals or conferences
as indicated, for the purpose of non-commercial dissemination of
scientific work.
The manuscripts are put on-line to facilitate this purpose.
These manuscripts are copyrighted by the authors or the journals in which
they were published.
You may copy a manuscript for scholarly, non-commercial purposes, such
as research or instruction, provided that you agree to respect these
copyrights.
Last Updated 11/10/04.