Share Email Print

Proceedings Paper

A novel interpretation of content authentication
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This work deals with practical and theoretical issues raised by the information-theoretical framework for authentication with distortion constraints proposed by Martinian et al.1 The optimal schemes proposed by these authors rely on random codes which bear close resemblance to the dirty-paper random codes which show up in data hiding problems. On the one hand, this would suggest to implement practical authentication methods employing lattice codes, but these are too easy to tamper with within authentication scenarios. Lattice codes must be randomized in order to hide their structure. One particular multimedia authentication method based on randomizing the scalar lattice was recently proposed by Fei et al.2 We reexamine here this method under the light of the aforementioned information-theoretical study, and we extend it to general lattices thus providing a more general performance analysis for lattice-based authentication. We also propose improvements to Fei et al.'s method based on the analysis by Martinian et al., and we discuss some weaknesses of these methods and their solutions.

Paper Details

Date Published: 1 March 2007
PDF: 12 pages
Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65050I (1 March 2007); doi: 10.1117/12.704271
Show Author Affiliations
Pedro Comesaña, Univ. College Dublin (Ireland)
Univ. de Vigo (Spain)
Félix Balado, Univ. College Dublin (Ireland)
Fernando Pérez-González, Univ. de Vigo (Spain)

Published in SPIE Proceedings Vol. 6505:
Security, Steganography, and Watermarking of Multimedia Contents IX
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top