|
Summary
We have developed
a unique system for image authentication and recovery. We explored unique
invariant properties in lossy compression such as JPEG, Motion JPEG, and
MPEG. Content-based invisible watermarks are designed based on the invariant
properties of such lossy compression and embedded into reconstructable
coefficients. We proved such watermarks can be used to distinguish acceptable
manipulations on digital images and malicious attacks (such as cropping
and replacement).
Applications include
medical, insurance, law enforcement, and news, in which some manipulations
are required while malicious manipulations must be rejected.
People
Ching-Yung Lin
Professor Shih-Fu
Chang
Demo
http://www.ee.columbia.edu/sari
Publication
C.-Y. Lin and S.-F.
Chang, SARI: Self-Authentication-and-Recovery Image Watermarking System,
ACM Multimedia 2001, Ottawa, Canada, Sep. 30 - Oct. 5, 2001.
(PS.GZ/PDF)
C.-Y. Lin and S.-F. Chang, A
Robust Image Authentication Method Surviving JPEG Lossy Compression,
Proceedings, IS&T/SPIE Symposium on Electronic Imaging: Science and
Technology (EI'98) - SPIE Storage and Retrieval of Image/Video Database,
San Jose, January 1998.
(PS.GZ/PDF)
C.-Y. Lin and S.-F. Chang, Semi-Fragile
Watermarking for Authenticating JPEG Visual Content, SPIE Security
and Watermarking of Multimedia Contents II, EI '00, San Jose, CA, Jan.
2000.
(PS.GZ/PDF)
C.-Y. Lin, Watermarking
and Digital Signature Techniques for Multimedia Authentication and Copyright
Protection, Doctoral Dissertation, Graduate School of Arts and Sciences,
Columbia University, 2000 (Advisor: Prof. Chang).
(PS.GZ/PDF)
L. Xie, K. Maeno, Q. Sun, C.-Y. Lin, S.-F. Chang, Benchmarking
for SARI Image Authentication System, ADVENT Tech Report, Nov. 2002.
(PS.GZ/PDF)
Download
Please go to the download
page
For problems or questions
regarding this web site contact The
Web Master.
Last updated: June 12, 2002.
|