Secure image authentication with discrete level tamper...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000

Reexamination Certificate

active

07454797

ABSTRACT:
Systems and methods for secure multimedia authentication with discrete level tamper localization are described. In these aspects, the term “discrete” means that tamper localization is at the pixel level with respect to an image or video data, or at the sample level with respect to audio data. More particularly, and in one aspect, multimedia is evaluated to determine authenticity of the multimedia. This evaluation is based on data block(s). Responsive to determining that the multimedia is not authentic, a tampered portion of the multimedia is localized by addressing each respective pixel or sample of the tampered portion.

REFERENCES:
patent: 2005/0246536 (2005-11-01), Roberts
patent: 2006/0020830 (2006-01-01), Roberts
patent: 2006/0059349 (2006-03-01), Roberts
patent: 2006/0095775 (2006-05-01), Jajodia et al.
patent: WO2004/002159 (2003-12-01), None
Hasan et al, “Fragile Blockwise Image Authentication Thwarting Vector Quanization Attack”, 2004, IEEE, pp. 530-533.
Celik, et al., “Hierarchical Watermarking for Secure Image Authentication with Localization”, IEEE Transactions on Image Processing, vol. 11, No. 6, Jun. 2002, pp. 585-595.
Fridrich et al., “New Fragile Authentication Watermark for Images” Image Processing, 2000. Proceedings. 2000 International Conference on Sep. 10-13, 2000, Piscataway, NJ, USA, IEEE, vol. 1, Sep. 10, 2000, pp. 446-449.
Fridrich, “A Hybrid Watermark for Tamper Detection in Digital Images” International Symposium on Signal Processing and its Applications. Proceedings, vol. 1, Aug. 22, 1999, pp. 301-304.
Li et al., “Fragile Authentication Watermark Combined with Image Feature and Public Key Cryptography” Signal Processing, 2004. Porceedings. ICSP '04. 2004 7th International Conference on Beijing, China Aug. 31-Sep. 4, 2004, Piscataway, NJ, USA, IEEE, Aug. 31, 2004, pp. 2286-2289.
Li et al., “Proceedings of the 17th International Conference on Pattern Recognition”, Aug. 23-24, 2004.
EPO Communication with Search Report dated Mar. 17, 2006, from counterpart EP patent application, European Patent Application No. 05109428.2, 9 pages.
Fridrich et al, “Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique,” J. Electronic Imaging, vol. 91, 2002, pp. 1-35.
Fridrich et al, “Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme,” Proc. SPIE, vol. 3971, Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000, pp. 428-437.
Fridrich, “Security of Fragile Authentication Watermarks with Localization,” Proc. SPIE vol. 4675, Security and Watermarking of Multimedia Contents IV, Jan. 2002, pp. 691-700.
Holliman et al, “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Trans. Image Processing, vol. 9, No. 3, Mar. 2000, pp. 432-441.
Li et al, “Oblivious Fragile Watermarking Scheme for Image Authentication,” IEEE Int. Conf. Acoustics, Speech, & Signal Processing, Orlando, FL, USA, May 2002, vol. VI, pp. 3445-3448.
Lu et al, “Fragile Watermarking Scheme for Image Authentication,” Electronics Letters, vol. 39, No. 12, Jun. 2003, pp. 898-900.
Memon et al, “On the Security of the Yeung-Mintzer Authentication Watermark,” Proc. IS&T PICS Symp., Savannah, Georgia, Mar. 1999, 7 pgs.
Wu et al, “Efficient Oracle Attacks on Yeung-Mintzer and Variant Authentication Schemes,” IEEE Int. Conf. Multimedia & Expo, Taiwan, Jun. 2004, 4 pgs.
Yeung et al, “An Invisible Watermarking Technique for Image Verification,” IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680-683.
Yeung et al, “Invisible Watermarking for Image Verification,” J. Electronic Imaging, vol. 7, No. 3, Jul. 1998, pp. 578-591.
Zhong et al, “A New Fragile Watermarking Technique for Image Authentication,” Int. Conf. Signal Processing, Beijing, vol. 9, Aug. 2002, pp. 792-795.
Zhu et al, “Multimedia Authentication and Watermarking,” Multimedia Information Retrieval and Management, Eds., Springer-Verlag, Berlin, Heidelberg, New York, 2003, Chap. 7, pp. 148-178.
Zhu et al., “When Seeing Isn't Believing,” IEEE Signal Processing, vol. 21, No. 2, Mar. 2004, pp. 40-49.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure image authentication with discrete level tamper... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure image authentication with discrete level tamper..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure image authentication with discrete level tamper... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4028024

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.