JOURNAL ARTICLE

<title>Distortion-bounded authentication techniques</title>

Nasir MemonPoorvi L. VoraBoon-Lock YeoMinerva M. Yeung

Year: 2000 Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Vol: 3971 Pages: 164-174   Publisher: SPIE

Abstract

Authentication techniques provide a means of ensuring the integrity of a message. The recent proliferation of multimedia content has led to a need for developing authentication mechanisms. Although, authentication techniques have been studied for many decades, multimedia authentication poses some new challenges. Perhaps the key such challenge being the need to authenticate multimedia content as opposed to its representation. In this paper, we review some of the techniques proposed in the literature for multimedia content authentication. We then propose distortion bounded authentication techniques that give hard guarantees on the amount of distortion that will be tolerated before the multimedia object under consideration is deemed unauthentic. The basic idea behind distortion-bounded authentication is simple. Quantization is performed (in feature space) before authentication, thereby restricting image features in a known and deterministic manner. The same quantization is performed prior to verification. Distortions less than half the quantization step size will not affect the verification process and the content will be deemed authentic. The basic framework is simple and can be applied with many different techniques, distortion measures and feature sets. We give examples of distortion-bound authentication techniques using the L1 and L2 norms in pixel domain.

Keywords:
Computer science Authentication (law) Bounded function Distortion (music) Quantization (signal processing) Theoretical computer science Multimedia Algorithm Computer security Mathematics Computer network Bandwidth (computing)

Metrics

24
Cited By
0.76
FWCI (Field Weighted Citation Impact)
0
Refs
0.74
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

<title>Authentication techniques for multimedia content</title>

Nasir MemonPoorvi L. Vora

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 1999 Vol: 3528 Pages: 412-422
JOURNAL ARTICLE

<title>Invertible authentication</title>

Jessica FridrichMiroslav GoljanRui Du

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2001
JOURNAL ARTICLE

<title>Perceptual image distortion</title>

P.C. TeoDavid J. Heeger

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 1994
JOURNAL ARTICLE

<title>Adjustable distortion correctors</title>

Daniel J. ReileyRussell A. Chipman

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 1992 Vol: 1690 Pages: 11-19
JOURNAL ARTICLE

<title>Multisensor user authentication</title>

John M. ColombiD. KreppSteven K. RogersDennis W. RuckMark E. Oxley

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 1993 Vol: 1966 Pages: 2-16
© 2026 ScienceGate Book Chapters — All rights reserved.