DCT-based cyber defense techniques

Yaron Amsalem, Anton Puzanov, Anton Bedinerman, Maxim Kutcher, Ofer Hadar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

Original languageEnglish
Title of host publicationApplications of Digital Image Processing XXXVIII
EditorsAndrew G. Tescher, Andrew G. Tescher
ISBN (Electronic)9781628417654, 9781628417654
StatePublished - 1 Jan 2015
EventApplications of Digital Image Processing XXXVIII - San Diego, United States
Duration: 10 Aug 201513 Aug 2015

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
ISSN (Print)0277-786X
ISSN (Electronic)1996-756X


ConferenceApplications of Digital Image Processing XXXVIII
Country/TerritoryUnited States
CitySan Diego


  • Cyber
  • discrete cosine transform (DCT)
  • steganography
  • watermarking

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering


Dive into the research topics of 'DCT-based cyber defense techniques'. Together they form a unique fingerprint.

Cite this