Digital Image Authentication: A Review

Digital Image Authentication: A Review

Copyright: © 2011 |Pages: 24
DOI: 10.4018/jdls.2011040104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only provides some practical applications on image authentication, but also describes general frameworks of image watermarking and the general techniques, including robust watermarking, fragile watermarking, and semi-fragile watermarking. This paper also addresses the potential issues on future research directions, including managing the PRNU database, development of advanced PRNU-based blind authentication techniques, and search for digital fingerprints.
Article Preview
Top

1. Digital Image Authentication

Due to the fast growth of digital technology, daily activities can be easily captured and saved in digital images, and then transmitted via the Internet. Despite the convenience, digital images suffer from problems, which can be summarised by the following questions: which person/device produces the image, who are authorised to access this image when it is stored and distributed, and whether the image is modified (Rey & Dugelay, 2002). As a result, digital image authentication (DIA) techniques have been developed in order to solve those security problems (Liu & Qiu, 2002). In the research of image authentication, DIA is a generic term for all the techniques performing anti-falsification, digital image copyright protection or access control (Lu & Liao, 2001).

  • 1)

    Anti-Falsification: Anti-falsification is one of the primary functions of DIA techniques, which aims to prove the authenticity and integrity of digital images (Li & Hong, 2008). If an image is modified, the DIA techniques for anti-falsification should be able to detect the modification and localise the modified areas. Figure 1 demonstrates the anti-falsification function by authenticating the image of a traffic scene, which may be used as evidence in the court of law. Figure 1(a) is the original image, while Figure 1(b) is a tampered version with a pedestrian embedded and the traffic lights altered. The authentication result is illustrated as Figure 1(c), with the tampered region shaded.

Figure 1.

The anti-falsification function of DIA

jdls.2011040104.f01
  • 2)

    Digital Image Copyright Protection: Copyright protection is another important authentication function in DIA (Wolfgang & Delp, 1997). In the application of copyright protection, the DIA techniques need to either identify the ownership of images or identify the source of images. To protect the commercial value of images and to fight against piracy, DIA techniques are applied to identify the ownership of the digital images. On the other hand, the trustworthiness of the source of digital images is also an important issue when the images are used in the news and media industry (Bartolini, Tefas, Barni, & Pitas, 2001). Therefore, the DIA techniques are also used to identify the source of digital media, including scanners, digital cameras and computer graphic software. Figure 2 illustrates the two applications in copyright protection.

Figure 2(a) illustrates a computer graphic artwork where the visual signature on the upper-right corner can be easily removed or changed. Thus DIA techniques are required to ascertain the ownership of the work in the case of copyright infringement. Figure 2(b), on the other hand, illustrates a photo captured by a traffic surveillance camera, showing a car illegally parking aside the road.

Figure 2.

The copyright protection functions of DIA

jdls.2011040104.f02

Complete Article List

Search this Journal:
Reset
Volume 5: 2 Issues (2015)
Volume 4: 2 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing