Share Email Print

Proceedings Paper

Information theoretic approach to the authentication of multimedia
Author(s): Emin Martinian; Brian Chen; Gregory W. Wornell
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop one information-theoretic formulation of this problem, and identify and interpret the associated fundamental performance limits. A consequence of our results is that there is a tradeoff between embedding distortion and robustness to channel noise, but no such tradeoff between these parameters and security to forgery. To develop some intuition, we outline a sphere packing analogy and show that the results from sphere packing and information theory have the same form. One important benefit of our framework is a coherent way to analyze and design authentication schemes for general source models, distortion metrics, and noisy channel models. We illustrate this by an example construction of a realizable authentication scheme. An important ingredient of our construction is the use of forward error correcting codes. We show that the application of fairly simple codes decreases the embedding distortion required by more than 5 dB without decreasing security or robustness. Our approach is general enough to be used in a wide variety of applications.

Paper Details

Date Published: 1 August 2001
PDF: 12 pages
Proc. SPIE 4314, Security and Watermarking of Multimedia Contents III, (1 August 2001); doi: 10.1117/12.435399
Show Author Affiliations
Emin Martinian, Massachusetts Institute of Technology (United States)
Brian Chen, Massachusetts Institute of Technology (United States)
Gregory W. Wornell, Massachusetts Institute of Technology (United States)

Published in SPIE Proceedings Vol. 4314:
Security and Watermarking of Multimedia Contents III
Ping Wah Wong; Edward J. Delp III, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?