Share Email Print

Proceedings Paper

Authenticating cropped and resized images using distributed source coding and expectation maximization
Author(s): Yao-Chung Lin; David Varodayan; Bernd Girod
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be inauthentic. The authentication data supplied to the decoder consisted of a Slepian-Wolf encoded image projection. We extend our scheme to authenticate cropped and resized images using an Expectation Maximization algorithm. Experimental results demonstrate that the proposed algorithm can distinguish legitimate encodings of authentic cropped and resized images from illegitimately modified versions using authentication data of less than 250 bytes.

Paper Details

Date Published: 4 February 2009
PDF: 8 pages
Proc. SPIE 7254, Media Forensics and Security, 725412 (4 February 2009); doi: 10.1117/12.805538
Show Author Affiliations
Yao-Chung Lin, Stanford Univ. (United States)
David Varodayan, Stanford Univ. (United States)
Bernd Girod, Stanford Univ. (United States)

Published in SPIE Proceedings Vol. 7254:
Media Forensics and Security
Edward J. Delp; Jana Dittmann; Nasir D. Memon; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top