Wednesday, 16 January 2013

Image Authentication Using Distributed Source Coding


NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD.,  AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926


DOT NET PROJECTS LIST--2013
DOT NET 2013 IEEE PAPERS


Image Authentication Using Distributed Source Coding
Abstract:
            We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian–Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
Existing System:
            Past approaches for image authentication fall into three groups: forensics, watermarking, and robust hashing. In digital forensics, the user verifies the authenticity of an image solely by checking the received content. Unfortunately, without any information from the original, one cannot completely confirm the integrity of the received content because content unrelated to the original may pass forensic checking. Another option for image authentication is watermarking. A semi-fragile watermark is embedded into the host signal waveform without perceptual distortion. Users can confirm authenticity by extracting the watermark from the received content. The system design should ensure that the watermark survives lossy compression, but that it breaks as a result of malicious manipulations. Unfortunately, watermarking authentication is not backward compatible with previously encoded contents; i.e., unmarked content cannot be authenticated later. Embedded watermarks might also increase the bit rate required when compressing a media file.
Proposed System:
            This paper develops authentication techniques based on robust hashing, which is inspired by cryptographic hashing. In this technique, the user checks the integrity of the received content using a small amount of data derived from the original content. Many hash-based image authentication systems achieve robustness against lossy compression by using compression-invariant features.

Software and Hardware Requirements                    
Hardware Required:                            
System                                    :           Pentium IV
Hard Disk                   :           80 GB
RAM                           :           512 MB
Software Required:
Operating System       :           Windows XP
Language                    :           C#

Modules:
·         Login
·         DSC implementation
·         Tampering Verification
·         Grid Splitter

No comments:

Post a Comment