NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
DOT NET PROJECTS LIST--2013
DOT NET 2013 IEEE PAPERS
Image Authentication Using Distributed Source Coding
Abstract:
We
present a novel approach using distributed source coding for image
authentication. The key idea is to provide a Slepian–Wolf encoded quantized
image projection as authentication data. This version can be correctly decoded
with the help of an authentic image as side information. Distributed source
coding provides the desired robustness against legitimate variations while detecting
illegitimate modification. The decoder incorporating expectation maximization
algorithms can authenticate images which have undergone contrast, brightness,
and affine warping adjustments. Our authentication system also offers tampering
localization by using the sum-product algorithm.
Existing System:
Past approaches for image authentication fall into three groups:
forensics, watermarking, and robust hashing. In digital forensics, the user
verifies the authenticity of an image solely by checking the received content.
Unfortunately, without any information from the original, one cannot completely
confirm the integrity of the received content because content unrelated to the
original may pass forensic checking. Another option for image authentication is
watermarking. A semi-fragile watermark is embedded into the host signal
waveform without perceptual distortion. Users can confirm authenticity by
extracting the watermark from the received content. The system design should
ensure that the watermark survives lossy compression, but that it breaks as a
result of malicious manipulations. Unfortunately, watermarking authentication
is not backward compatible with previously encoded contents; i.e., unmarked
content cannot be authenticated later. Embedded watermarks might also increase
the bit rate required when compressing a media file.
Proposed System:
This paper develops authentication techniques based on robust hashing,
which is inspired by cryptographic hashing. In this technique, the user checks
the integrity of the received content using a small amount of data derived from
the original content. Many hash-based image authentication systems achieve
robustness against lossy compression by using compression-invariant features.
Software
and Hardware Requirements
Hardware Required:
System : Pentium IV
Hard Disk : 80
GB
RAM : 512 MB
Software Required:
Operating
System : Windows
XP
Language : C#
Modules:
·
Login
·
DSC implementation
·
Tampering Verification
·
Grid Splitter
No comments:
Post a Comment