Paper
22 September 2015 DCT-based cyber defense techniques
Yaron Amsalem, Anton Puzanov, Anton Bedinerman, Maxim Kutcher, Ofer Hadar
Author Affiliations +
Abstract
With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yaron Amsalem, Anton Puzanov, Anton Bedinerman, Maxim Kutcher, and Ofer Hadar "DCT-based cyber defense techniques", Proc. SPIE 9599, Applications of Digital Image Processing XXXVIII, 95991F (22 September 2015); https://doi.org/10.1117/12.2187498
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Defense and security

Video

Digital watermarking

Image quality

Multimedia

Steganography

Image compression

RELATED CONTENT


Back to Top