PDF(435 KB)
Image content authentication technique based
on Laplacian Pyramid
Author information
+
School of Computer Science and Engineering, South China University of Technology;
Show less
History
+
Published |
05 Jun 2008 |
Issue Date |
05 Jun 2008 |
Abstract
This paper proposes a technique of image content authentication based on the Laplacian Pyramid to verify the authenticity of image content. First, the image is decomposed into Laplacian Pyramid before the transformation. Next, the smooth and detail properties of the original image are analyzed according to the Laplacian Pyramid, and the properties are classified and encoded to get the corresponding characteristic values. Then, the signature derived from the encrypted characteristic values is embedded in the original image as a watermark. After the reception, the characteristic values of the received image are compared with the watermark drawn out from the image. The algorithm automatically identifies whether the content is tampered by means of morphologic filtration. The information of tampered location is p resented at the same time. Experimental results show that the proposed authentication algorithm can effectively detect the event and location when the original image content is tampered. Moreover, it can tolerate some distortions produced by compression, filtration and noise degradation.
Cite this article
Download citation ▾
WO Yan, HAN Guoqiang.
Image content authentication technique based
on Laplacian Pyramid. Front. Electr. Electron. Eng., 2008, 3(2): 188‒193 https://doi.org/10.1007/s11460-008-0046-y
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
This is a preview of subscription content, contact
us for subscripton.
References
1. Wong P W Memon N Secret and public key imagewatermarking schemes for image authentication and ownership verificationIEEE Transactions on Image Processing 2001 10(10)15931601. doi:10.1109/83.951543
2. Memon N Vora P Yeo B L et al.Distortion bounded authentication techniquesIn: Proceedings of the SPIE on Security and Watermarkingof Multimedia Contents IISan JoseSPIE 2000 164174
3. Queluz M P TowardsRobust, content based techniques for image authenticationIEEE Second Workshop on Multimedia Signal ProcessingRedondo BeachIEEE Press 1998 297302
4. Rey C Dugelay J L Blind detection of maliciousalterations on still image using robust watermarksIEE Seminar on Secure Images and Image AuthenticationLondonIEE Press 2000 716
5. Xie L Arce G R A class of authentication digitalwatermarks for secure multimedia communicationIEEE Transactions on Image Processing 2001 10(11)17541764. doi:10.1109/83.967402
6. Wo Y Han G Q Zhang B A new feature-based image content authentication algorithmChinese Journal of Computers 2005 28(1)105112(in Chinese)
7. Wo Y Han G Q Zhang J W et al.New image content authentication algorithm basedon wavelet transform and morphologicJournalon Communications 2005 26(8)915(in Chinese)
8. Wo Y Han G Q Blind watermarking algorithmbased on wavelet transform and visual perception characteristicsJournal of South China University of Technology (NaturalScience Edition) 2005 33(4)2933(in Chinese)
9. Burt P Adelson E The Laplacian pyramid as acompact image codeIEEE Transactions onCommunications 1983 31(4)532540. doi:10.1109/TCOM.1983.1095851
10. Song J Delp E J A generalization of morphologicalfilters using multiple structuring elementsIEEE International Symposium on Circuits and Systems 1989 2(3)991994. doi:10.1109/ISCAS.1989.100518