IEEE Int. Conf. on Multimedia & Expo, July 6-8, 2005, pp. 229-232, Amsterdam, The Netherlands.

Image Authentications Under Geometric Attacks Via Structure Matching

Vishal Monga, Divyanshu Vats, and Brian L. Evans

Embedded Signal Processing Laboratory, Center for Perceptual Systems, The University of Texas at Austin, Austin, TX 78712 USA
Vishal.Monga@xeroxlabs.com - vats@ece.utexas.edu - bevans@ece.utexas.edu

Paper - Images from Paper - Presentation Slides - Software

Image Hashing Research at UT Austin

Abstract

Surviving geometric attacks in image authentication is considered to be of great importance. This is because of the vulnerability of classical watermarking and digital signature based schemes to geometric image manipulations, particularly local geometric attacks. In this paper, we present a general framework for image content authentication using salient feature points. We first develop an iterative feature detector based on an explicit modeling of the human visual system. Then, we compare features from two images by developing a generalized Hausdorff distance measure. The use of such a distance measure is crucial to the robustness of the scheme, and accounts for feature detector failure or occlusion, which previously proposed methods do not address. The proposed algorithm withstands standard benchmark (e.g. Stirmark) attacks including compression, common signal processing operations, global as well as local geometric transformations, and even hard to model distortions such as print and scan. Content changing (malicious) manipulations of image data are also accurately detected.


COPYRIGHT NOTICE: All the documents on this server have been submitted by their authors to scholarly journals or conferences as indicated, for the purpose of non-commercial dissemination of scientific work. The manuscripts are put on-line to facilitate this purpose. These manuscripts are copyrighted by the authors or the journals in which they were published. You may copy a manuscript for scholarly, non-commercial purposes, such as research or instruction, provided that you agree to respect these copyrights.


Last Updated 11/10/04.