Paper
1 March 2007 A novel interpretation of content authentication
Author Affiliations +
Abstract
This work deals with practical and theoretical issues raised by the information-theoretical framework for authentication with distortion constraints proposed by Martinian et al.1 The optimal schemes proposed by these authors rely on random codes which bear close resemblance to the dirty-paper random codes which show up in data hiding problems. On the one hand, this would suggest to implement practical authentication methods employing lattice codes, but these are too easy to tamper with within authentication scenarios. Lattice codes must be randomized in order to hide their structure. One particular multimedia authentication method based on randomizing the scalar lattice was recently proposed by Fei et al.2 We reexamine here this method under the light of the aforementioned information-theoretical study, and we extend it to general lattices thus providing a more general performance analysis for lattice-based authentication. We also propose improvements to Fei et al.'s method based on the analysis by Martinian et al., and we discuss some weaknesses of these methods and their solutions.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Pedro Comesaña, Félix Balado, and Fernando Pérez-González "A novel interpretation of content authentication", Proc. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65050I (1 March 2007); https://doi.org/10.1117/12.704271
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Distortion

Digital watermarking

Multimedia

Computer programming

Data hiding

Computer security

Signal detection

RELATED CONTENT


Back to Top