This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and predefined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. The message calculation and embedding procedure are based on two proposed quantization properties that always exist under different JPEG quantization tables. Therefore, the proposed image authentication approach can tolerate JPEG compression efficiently. Experimental results demonstrate the effectiveness of the proposed image authentication approach.
Relation:
Journal of Information Science and Engineering 23(2), pp.511-524