COMPENSATED SIGNATURE EMBEDDING BASED MULTIMEDIA CONTENT AUTHENTICATION SYSTEM Sufyan Ababneh, Ashfaq Khokhar, Rashid Ansari Dept. of Electrical and Computer Engineering, University of Illinois at Chicago, Illinois, USA ABSTRACT Digital content authentication and preservation is an extremely challenging task in realizing decentralized digital libraries. The concept of compensated signature embedding is proposed to de- velop an effective multimedia content authentication system. The proposed system does not require any third party reference or side information. Towards this end, a content-based fragile sig- nature is derived and embedded into the media using a robust watermarking technique. Since the embedding process intro- duces distortion in the media, it may lead to authentication fail- ure. We propose to adjust the media samples iteratively or using a closed form process to compensate for the embedding distor- tion. Using an example image authentication system, we show that the proposed scheme is highly effective in detecting even minor modifications to the media. Index Termsauthentication, preservation, watermarking, com- pensated signature embedding 1. INTRODUCTION The unprecedented accessibility of online multimedia contents in re- cent times has given rise to their vulnerability to corruption and tam- pering, particularly in an open, peer-to-peer, and possibly malicious environment. Several digital library initiatives have been launched to design and develop technologies for authentication and preser- vation of contents, format, presentation and functionality of online multimedia documents. In this regard, authentication and preser- vation of multimedia contents such as video, images and audio is extremely challenging particularly in an open decentralized environ- ment where a central entity is not always available or may have been compromised. We argue that the amenability of non-textual multi- media data to imperceptible insertions offers feature-rich alternatives for authentication and preservation. Depending on the end user ap- plication, authentication may or may not tolerate modifications to the original data. Both fragile and robust watermarking techniques have been used in conjunction with content-based signatures to authenticate a digital media. A disadvantage of these schemes arises from the fact that the very process of embedding a watermark alters the media, causing the subsequent authentication test to fail if the signatures are very fragile (highly sensitive to modifications). To prevent this, most of the schemes either do not use content-based signatures or tend to divide the media domain into two parts: verifiable part from which the signature is derived, and embedding part where the signature is embedded. The level of robustness or fragility is determined based on the application requirements. Robust watermarking schemes combined with robust content- based signatures have been used for authentication and quality as- sessment of multimedia [1][2]. However, the target applications for these schemes -such as multimedia retrieval- require tolerance to- ward normal and incidental distortions while detecting tampering and significant distortions. On the other hand, fragile watermark- ing based authentication techniques can use high sensitive signatures (fragile) [3] [4]. In such schemes, the watermark is lost and signa- tures are altered as soon as any modification is applied to the media. It has also been used without content-based signatures. However, in such schemes the use of predefined patterns can not guarantee that no one has intentionally tampered with the media. This is because an adversary can forge a fragile watermark if the embedded pattern is not derived from media contents [5]. In this paper, a new multimedia authentication system is pro- posed which allows the combining of robust watermarking and frag- ile signatures to realize a highly effective authentication framework in the absence of a central entity or side information. The system allows for the flexibility to use any robust embedding technique in conjunction with the proposed compensated signature embedding (CSE) concept to provide feature-rich multimedia authentication. This scheme can provide an ideal mechanism for digital multimedia preservation in which verifying the authenticity of the multimedia is an essential step before further attempts for recovery are initiated. The proposed scheme can be applied on any type of digital media in- cluding still images, video, audio, text and any combination of them. 2. CSE AUTHENTICATION SYSTEM The framework of the compensated signature embedding scheme (CSE) consists of two main functionalities: encoding and decoding. As shown in Fig.1, the encoder generates a fragile signature, embeds a robust watermark and compensates for signature embedding. The decoder extracts the embedded signature, generates a new signature and evaluates the results. All these functionalities operate on the me- dia signal itself or its transformed version. For convenience, some notation is introduced. The set of integers is denoted by Z. For any positive integer K, let I K = {k ∈Z :0 k K 1}. The set D denote the domain of the signal. Let M and N be positive integers that are multiples of 2 L , where L is also a positive integer. Define M l = M/2 l and N l = N/2 l , for l ∈Z, 1 l L. For a raw M × N image, D = IM × IN . We are interested in the subband/wavelet representation of the media using L-level decomposition. Although D defined for the raw media will work, we will define it differently in order to capture the structure of the wavelet decomposition at different levels and we will use image signals for illustration: D = {n =(l, n l , i, j ): l 1 IL,n l I 3+λ ,i IM l ,j IN l } (1) Where λ = δ lL and δ kl is the Kronecker’s delta. The signal w (i.e. the image or its transformed version) is defined as a mapping {w : D −→ R}, with some additional structure such as square I - 393 1-4244-1437-7/07/$20.00 ©2007 IEEE ICIP 2007