Image Authentication PDF
Image Authentication PDF
com
1. INTRODUCTION
This paper explores the various techniques used to authenticate the visual
data recorded by the automatic video surveillance system. Automatic video
surveillance systems are used for continuous and effective monitoring and
reliable control of remote and dangerous sites. Some practical issues must be
taken in to account, in order to take full advantage of the potentiality of VS
system. The validity of visual data acquired, processed and possibly stored by the
VS system, as a proof in front of a court of law is one of such issues. But visual
data can be modified using sophisticated processing tools without leaving any
visible trace of the modification. So digital or image data have no value as legal
proof, since doubt would always exist that they had been intentionally tampered
with to incriminate or exculpate the defendant. Besides, the video data can be
created artificially by computerized techniques such as morphing. Therefore the
true origin of the data must be indicated to use them as legal proof. By data
authentication we mean here a procedure capable of ensuring that data have not
been tampered with and of indicating their true origin.
101seminartopics.com
101seminartopics.com
3. AUTHENTICATION TECHNIQUES
Authentication techniques are performed on visual data to indicate that the
data is not a forgery; they should not damage visual quality of the video data. At
the same time, these techniques must indicate the malicious modifications
include removal or insertion of certain frames, change of faces of individual,
time and background etc. Only a properly authenticated video data has got the
value as legal proof. There are two major techniques for authenticating video
data. They are as follows
101seminartopics.com
degrading the content and are a covert means in situation where copyright fails to
provide robustness.
4. CRYPTOGRAPHY
Mounting concern over the new threats to privacy and security has lead to
wide spread adoption of cryptography. Cryptography is the science of
transforming documents. It has mainly two functions
Encryption
Decryption
The purpose of encryption is to render a document unreadable by all
except those who authorize to read it. Cryptographers refer to the content of the
original document as plain text. Plain text is converted in to cipher form using an
algorithm and a variable or key. The key is a randomly selected string of
numbers.
PLAIN
TEXT
ENCRYPTION
KEY
ENCRPTION
ALGORITHEM
CIPHER
TEXT
CIPHER TEXT
DECRYPTION
KEY
DECRYPTION
ALGORITHEM
PLAIN TEXT
101seminartopics.com
Only after decoding the cipher text using the key the content of the
document is revealed to the common people. Encryption schemes are classified
in to
1. Symmetric encryption
In which the same key is used to both encode and decode the document.
2. Public key or asymmetric encryption
It requires a pair of keys: one for encrypting the plain text and the other
for decrypting the cipher text. A file encrypted with one key of a pair can be
decrypted with other key of the same pair.
101seminartopics.com
Before sending the video sequence to the central unit, cameras calculate a
digital summary or digest of the video by means of a proper hash function. The
digest is then encrypted with their private key. Encryption is done by considering
the digitized value of the brightness of each pixel. Digital signal is a sequence of
zeros and ones and it is encrypted with the private key using a proper algorithm.
101seminartopics.com
The signed digest thus obtained is then transmitted to the central unit together
with the acquired visual sequence.
Later the signal digest is used to prove data integrity or to trace back to
their origin. The signed digest is read using the public key of the camera which
produce the video and check if it corresponds to the digest derived from the
decrypted video content using the same hash function.
Any manipulation of the data will change the calculated image digest
derived from the decrypted data. Any discrepancy between the decrypted digest
and calculated image digest indicate that the data has been tampered, with
identical digest indicates that the data is genuine.
Value of the visual data can be added by tying each frame to the particular
label of the instant the frame has been produced yet. This can be achieved by
printing date and time of creation of each frame. Any modification of either the
date or time could be easily revealed since it would change the locally calculated
image digest.
101seminartopics.com
101seminartopics.com
6. WATERMARKING
A digital watermark is a signal that is imperceptibly embedded within
digital data. This signal can be detected or extracted by means of computations to
make some assertions about the host data.
Digital watermark is a signal which added to a document to authenticate it
and to prove the ownership. A commonly encountered digital watermark is the
logo most television channels display on the top of the television screen. Not
only does it advertise the channel but also provides the legal benefit of having a
source signature persist during video recording. Watermark task consists of two
main steps
1. Watermark casting:-in which the signal represented by the watermark is
transmitted over the channel, that is in watermark casting an encoder function
takes a host image f and a watermark w and generate a new image
Fw= (f, w)
2. Watermark detection:-in which the signal is received and extracted from
possibly corrupted image.
101seminartopics.com
still be detected after nondestructive transformation of host document. Two
approaches for watermarking data authentication are possible
1. Fragile watermarking
2. Robust watermarking
Fragile watermarking refers to the case where watermark inserted within
the data is lost or altered as soon as host data undergoes any modification.
Watermark loss or alternation is taken as evidence that data has been tampered
with, whereas the information contained within data used to demonstrate data
origin
In case of robust watermarking a summary of the candidate frame or video
sequence is computed and is inserted within the video sequence. Information
about the data origin is also with the summary. To prove data integrity the
information conveyed by the watermark is recovered and compared with the
actual content of the sequence. Their mismatch is taken as an evidence of data
tampering. The capability to localize the manipulation will depend on the
summary of which is embedded in to the image.
WATERMARKING
ROBUST
WATERMARKIN
G
FRAGILE
WATREMARKING
INVISIBLE
WATERMARKIN
G
VISIBLE
WATERMARKING
DUAL
WATERMARKIN
G
101seminartopics.com
101seminartopics.com
By considering particular cases the requirement for the authentication of
VS data are following.
101seminartopics.com
A solution to this problem is offered by authentication techniques capable
of localizing manipulations. Once the modification is precisely localized, it will
be up to the court law to decide if it is malicious of innocuous.
101seminartopics.com
The embedded water mark can be made to depend on the frame number
and to bear time information. Frame exchange or substitution would thus be
easily detected and acquisition time can be reliably extracted.
In figure below a sketch of a simple VS system in which water marking is
used to authenticate VS data in its raw form is given. Time, date and frame serial
number are over written to every single frame before authentication.
The
101seminartopics.com
7. WATERMARKING ALGORITHM
A watermarking algorithm for VS data authentication based on semifragile watermarking of each frame of the video sequence is described in this
section. The various steps for the watermarking process are as follows.
101seminartopics.com
In this case, frame removal or frame substitution can be easily detected as
non authentic. To perform authenticity check, the detection should first know the
frame number in the sequence which is always zero.
Watermark embedding is performed by altering all the pixels of the
original frame according to the following formula.
Fw(x) = f(x)
if w(x) = 0
if w(x) =1
101seminartopics.com
A detection function D is defined such that by applying the detection
function to the watermarked image a detection image d(x) is produced.
d(x) = D (fw(x), n(x))
Now we frame the false detection image given by
Ew(x) =
101seminartopics.com
This test
indicates whether the alternations made on the image are concentrated in certain
regions (Malicious tampering) or one spread on the image (innocuous
alternations).
(a)
(b)
(c)
101seminartopics.com
8. OTHER APPLICATIONS
1. To protect the intellectual property right of a music publisher who
distributes music scores over digital media.
Digital piracy is a serious concern to the musical industry.
Customers receive music in digital data format and such data can be pirated and
redistributed very easily. By using image score watermarking we can prevent
this.
2. It can be used for everything from sending e-mail and storing medical
records and legal contracts to conducting on-line transactions.
9. ADVANTATGES
1. Robustness to high quality lossy image compression.
2. Automatic
discrimination
between
malicious
and
innocuous
manipulations.
3. Controllable visual deterioration of the VS sequence by varying the
watermark embedding power.
4. Watermark embedding and detection can be performed in real time for
digital data.
10. DISADVANTAGES
1. Frame independent watermark can be easily found by comparative analysis of
all image sequence frames and then could be easily added again to fake frames.
2. The detector should know the frame number in order to perform authenticity
check.
101seminartopics.com
11. CONCLUSION
In these modern eras, visual surveillance system finds application in
almost all fields, ranging from commercial to defense. The video data acquired
by VS system are forming vital evidence for several legal situations. So for such
situations, the importance of authenticating their content is very high.
Cryptography and watermarking based authenticating techniques are quite safe
and efficient for this purpose and they are likely to remain for quite for some
while.
101seminartopics.com
12. REFERENCES
1. C. Ragazoni, G.Fabri, Image Authentication Techniques for VS,
Proceedings of IEEE, October 2001.
2. M.M.Yeung and F.Mintzer A watermark for digital image IEEE
Spectrum, April 2002.
3. Digital Watermarking for protecting piracy, Electronics for you,
January 2003.
4. Encryption wars, IEEE Spectrum, April 2000.
5. www.ctr.columbia.edu
6. citeseer.nj.nec.com/wolfgang96watermark.html
101seminartopics.com
ABSTRACT
Automatic video surveillance (AVS) systems are used for continuous and
effective monitoring of dangerous and remote sites. Video data acquired by the
automatic video surveillance system can be recorded and presented as a proof in
front of court law. But digital video data lacks legal validity due to the ease to
manipulate them without leaving any trace of modification. Image authentication
is the process of giving a legal validity to the video data. By authentication
technique content tampering can be detected and we can indicate the true origin
of the data. There are two types of authentication schemes, which are
1. Cryptographic data authentication.
2. Watermarking-based authentication.
In this presentation an attempt is made to present the basic features of the
image authentication techniques.
101seminartopics.com
ACKNOWLEDGEMENT
I extend my sincere gratitude towards Prof. P.Sukumaran Head of
Department for giving us his invaluable knowledge and wonderful technical
guidance
I express my thanks to Mr. Muhammed Kutty our group tutor and also
to our staff advisors Ms. Biji Paul, Mr. Noushad V Moosa, Mr. Baiju Karan
for their kind co-operation and guidance for preparing and presenting this
seminar.
I also thank all the other faculty members of AEI department and my
friends for their help and support.
101seminartopics.com
CONTENTS
1.
INTRODUCTION
2.
3.
AUTHENTICATION TECHNIQUES
4.
CRYPTOGRAPHY
5.
6.
WATERMARKING
6.1 CLASSIFICATION OF WATERMARKING AUTHENTICATION
SCHEMS
6.2 REQIREMENTS OF WATERMARKING BASED VS DATA
AUTHENTICATION
7.
WATERMARKING ALGORITHM
7.1 WATERMARK GENERATION AND EMBEDDING
7.2 WATERMARK DETECTION
7.3 AUTHENTICATION CHECK
8.
OTHER APPLICATIONS
9.
ADVANTATGES
10. DISADVANTAGES
11. CONCLUSION
12. REFERENCES