Share Email Print
cover

Proceedings Paper

A hypothesis testing approach for achieving semi-fragility in multimedia authentication
Author(s): Chuhong Fei; Deepa Kundur; Raymond Kwong
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

This paper studies the problem of achieving watermark semi-fragility in multimedia authentication through a composite hypothesis testing approach. The embedding of a semi-fragile watermark serves to distinguish legitimate distortions caused by signal processing manipulations from illegitimate ones caused by malicious tampering. This leads us to consider authentication verification as a composite hypothesis testing problem with the watermark as a priori information. Based on the hypothesis testing model, we investigate the best embedding strategy which assists the watermark verifier to make correct decisions. Our results show that the quantization-based watermarking method is more appropriate than the spread spectrum method to achieve the best tradeoff between two error probabilities. This observation is confirmed by a case study of additive Gaussian white noise channel with Gaussian source using two figures of merit: relative entropy of the two hypothesis distributions and the receiver operating characteristic. Finally, we focus on certain common signal processing distortions such as JPEG compression and image filtering, and investigate the best test statistic and optimal decision regions to distinguish legitimate and illegitimate distortions. The results of the paper show that our approach provides insights for authentication watermarking and allows better control of semi-fragility in specific applications.

Paper Details

Date Published: 17 February 2006
PDF: 12 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 607220 (17 February 2006); doi: 10.1117/12.643502
Show Author Affiliations
Chuhong Fei, Univ. of Toronto (Canada)
Deepa Kundur, Texas A&M Univ. (United States)
Raymond Kwong, Univ. of Toronto (Canada)


Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top