Open Access Open Access  Restricted Access Subscription or Fee Access

A Lossless Compression Technique with Forgery Detection

S. Manimurugan, Dr.K. Porkumaran, Neenu Sebastian, Neethu Rajan

Abstract


Today images are widely used for the authentication purposes. For example in digital watermarking, visual cryptography etc, we use images for the authentication. Here images are transmitted from sender to receiver through a communication network, where they are processed for ensuring the authentication .While transmitting the images we must ensure that it is compressed effectively without losing the quality of image .Another threat while sending the image through network is that, it can be accessed and modified by a third party easily. This will affect the integrity of the image and it cannot be used for the authentication purposes. For ensuring a better usage of image for authentication purposes our approach uses the JPEG LS compression technique, which provides a better compression rate and good visual quality. For checking the integrity of image here the JPEG Ghost technique is used.

Keywords


Compression, Digital Forgeries, JPEG Compression ,JPEG Ghost, JPEG LS.

Full Text:

PDF

References


Chih-Ming Kung, Shu-Tsung Chao,Yen-Chen Tu, Yu-Hua Yan, Chih-Hsien Kung,” A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application” in JOURNAL Of Multimedia, VOL. 4, NO. 3, June 2009.

Zhi Zhou, Arce, G.R., Di Crescenzo, G.,”Halftone visual cryptography” in IEEE transcations on image processing, volume 15 , Issue 8,pp.2441-2453,August 2006.

Upmanyu, M,Namboodiri, A.M,Srinathan, K, Jawahar, C.V,” Blind Authentication: A Secure Crypto-Biometric Verification Protocol” in IEEE Transactions on Information Forensics and Security, volume 5,Issue 2,pp.255-268,June 2010.

Paul G. Howard and Jeffrey Scott Vitter, “Fast and Efficient Lossless Image Compression”, IEEE Computer Society/NASA/CESDIS Data Compression Conference, Snowbird, Utah, March 30-April 1, 1993, pages 351-360.

G. K. Wallace, “The JPEG Still Picture Compression Standard”, Communication of the ACM, Vol. 34, No. 4, 1991, pp. 30-44

C. Christopoulos, A. Skodras, T. Ebrahimi, “The JPEG2000 Still Image Coding System: An Overview”, IEEE Trans. on Consumer Electronics, Vol.46, No.4, November 2000, pp. 1103-1127

S. Ye, Q. Sun, and E. Chang, “Detecting digital image forgeries by measuring inconsistencies of blocking artifact,” in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 12–15.

Hany Farid, “Exposing digital forgeries in color filter array interpolated images,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3948–3959, 2005.

J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images via DCT coefficient analysis,” in European Conference on Computer Vision, Graz, Austria, 2006.

J. Fridrich, D. Soukal, and J. Luk´a˘s, “Detection of copy-move forgery in digital images,” in Proceedings of Digital Forensic Research Workshop, August 2003

M. K. Johnson and H. Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” in ACM Multimedia and Security Workshop, 2005.

Shaou-Gang Miaou, Fu-Sheng Ke, and Shu-Ching Chen, “ A Lossless Compression Method for Medical Image Sequences Using JPEG-LS and Interframe Coding” , IEEE Transactions On Information Technology In Biomedicine, Vol. 13, No. 5, September 2009

M. J. Weinberger, G. Seroussi, G. Sapiro, and E. Ordentlich, “JPEG-LS with limited-length code words.” ISO/IEC JTC1/SC29/WG1 document N538, July 1997

M. J. Weinberger, G. Seroussi, and G. Sapiro, “LOCO-I: A low complexity, context-based, lossless image compression algorithm,” in Proc. 1996 Data Compression Conference, (Snowbird, Utah, USA), pp. 140–149, Mar. 1996.

G. Sapiro, G. Seroussi, and M. Weinberger, “LOCO-I: A low complexity, context-based, lossless image compression algorithm,” in Proc. IEEE DCC ‟96, Snowbird, UT, Mar.–Apr. 1996.

Hany Farid, “Exposing Digital Forgeries from JPEG Ghosts”, IEEE Transactions on Information Forensics and Security, 2009

“JPEG-LS; Lossless and near-lossless coding of continuous tone still images,”, ISO/IEC JTC 1/SC 29/WG 1 FCD 14 495, July 1997.

G. Schaefer and M. Stich, “UCID - an uncompressed colour image database,” School of Computing and Mathematics, Nottingham Trent University, U.K., Tech. Rep., 2003.

I. Ueno and F. Ono, “Proposed modification of LOCO-I for its improvement of the performance,” ISO/IEC JTC1/SC29/WG1 document N297, Feb. 1996.

M. J. Weinberger, J. Rissanen, and R. B. Arps, “Applications of universal context modeling to lossless compression of gray-scale images,” IEEE Trans. Image Processing, vol. 5, pp. 575–586, Apr. 1996.

G. G. Langdon, Jr. and C. A. Haidinyak, “Experiments with lossless and virtually lossless image compression algorithms,” in Proc. SPIE, vol. 2418, pp. 21–27, Feb. 1995.

X. Wu and N. D. Memon, “Context-based, adaptive, lossless image coding,” IEEE Trans. Commun.,vol. 45 (4), pp. 437–444, Apr. 1997.

X.Wu, “Efficient lossless compression of continuous-tone images via context selection and quantization,” IEEE Trans. Image Processing, vol. IP-6, pp. 656–664, May 1997.

B. Meyer and P. Tischer, “TMW – A new method for lossless image compression,” in Proc. of the 1997 International Picture Coding Symposium (PCS97), (Berlin, Germany), Sept. 1997.

ISO/IEC 10918-1, ITU Recommendation T.81, “Digital compression and coding of continuous tone still images - Requirements and guidelines,” Sept. 1993.

M. Feder and N. Merhav, “Relations between entropy and error probability,” IEEE Trans. Inform. Theory, vol. IT-40, pp. 259–266, Jan. 1994.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.