View Printable Version

Authenticated Image Compression Abstract

Digital images are valuable commodity in today's society. As a result, the ability to store, access, or transmit them in an efficient and secure manner has become crucial. Since a large number of bits is typically required to represent even a single image, many good image compression schemes have been developed over the last few decades. These schemes led to various efficient representations of images.

As more and more digital images are distributed via the internet, or stored in databases, the issue of protecting these images from fraud attacks becomes a necessity. Embedding a digital watermark (also known as digital signature) in a given image is an authentication scheme which is capable of detecting any change made to an image, including changes in pixel values and image size, without requiring the existence of the original image. However, non of the existing authentication schemes attempt to predict the source of these changes, i.e., whether these changes are due to a fraud attack, transmission errors, filtering, or lossy compression, although each of these sources has different nature. Moreover, if a digital watermark is embedded first, followed by applying lossy compression, the authentication scheme may fail to validate the image, due to the loss of information during compression. On the other hand, if the compression scheme is applied first, the digital watermarking scheme may not be able to benefit from the two-dimensional nature of the image data, due to the higher and complex representation of the compressed data. Also, most likely the decompression module will not be able to produce the image, since decompression is sensitive to any altering in the decompressed data.

This proposed research will attempt at developing a new class of compression schemes with authentication capability. This class of authenticated image compression schemes allows the watermarking process to benefit from the two-dimensional nature of the image data. Moreover, it protects the authentication process from failure, due to the loss of information during compression. Furthermore, it facilitates a progressive authentication, by which a partial transmission of an image can still be authenticated. This novel feature is extremely important for several imaging applications, including trusted camera, commercial image transaction, legal usage of images, the archival and retrieval of medical images. This feature is not available in any of the existing authentication systems. Finally, this research will also investigate and develop authentication schemes that can predict the source of the change, within a certain confidence.