22 September 2015 DCT-based cyber defense techniques
Author Affiliations +
Abstract
With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yaron Amsalem, Yaron Amsalem, Anton Puzanov, Anton Puzanov, Anton Bedinerman, Anton Bedinerman, Maxim Kutcher, Maxim Kutcher, Ofer Hadar, Ofer Hadar, } "DCT-based cyber defense techniques", Proc. SPIE 9599, Applications of Digital Image Processing XXXVIII, 95991F (22 September 2015); doi: 10.1117/12.2187498; https://doi.org/10.1117/12.2187498
PROCEEDINGS
13 PAGES


SHARE
RELATED CONTENT


Back to Top