Image content authentication technique based on Laplacian Pyramid

WO Yan, HAN Guoqiang

PDF(435 KB)
PDF(435 KB)
Front. Electr. Electron. Eng. ›› 2008, Vol. 3 ›› Issue (2) : 188-193. DOI: 10.1007/s11460-008-0046-y

Image content authentication technique based on Laplacian Pyramid

  • WO Yan, HAN Guoqiang
Author information +
History +

Abstract

This paper proposes a technique of image content authentication based on the Laplacian Pyramid to verify the authenticity of image content. First, the image is decomposed into Laplacian Pyramid before the transformation. Next, the smooth and detail properties of the original image are analyzed according to the Laplacian Pyramid, and the properties are classified and encoded to get the corresponding characteristic values. Then, the signature derived from the encrypted characteristic values is embedded in the original image as a watermark. After the reception, the characteristic values of the received image are compared with the watermark drawn out from the image. The algorithm automatically identifies whether the content is tampered by means of morphologic filtration. The information of tampered location is p resented at the same time. Experimental results show that the proposed authentication algorithm can effectively detect the event and location when the original image content is tampered. Moreover, it can tolerate some distortions produced by compression, filtration and noise degradation.

Cite this article

Download citation ▾
WO Yan, HAN Guoqiang. Image content authentication technique based on Laplacian Pyramid. Front. Electr. Electron. Eng., 2008, 3(2): 188‒193 https://doi.org/10.1007/s11460-008-0046-y

References

1. Wong P W Memon N Secret and public key imagewatermarking schemes for image authentication and ownership verificationIEEE Transactions on Image Processing 2001 10(10)15931601. doi:10.1109/83.951543
2. Memon N Vora P Yeo B L et al.Distortion bounded authentication techniquesIn: Proceedings of the SPIE on Security and Watermarkingof Multimedia Contents IISan JoseSPIE 2000 164174
3. Queluz M P TowardsRobust, content based techniques for image authenticationIEEE Second Workshop on Multimedia Signal ProcessingRedondo BeachIEEE Press 1998 297302
4. Rey C Dugelay J L Blind detection of maliciousalterations on still image using robust watermarksIEE Seminar on Secure Images and Image AuthenticationLondonIEE Press 2000 716
5. Xie L Arce G R A class of authentication digitalwatermarks for secure multimedia communicationIEEE Transactions on Image Processing 2001 10(11)17541764. doi:10.1109/83.967402
6. Wo Y Han G Q Zhang B A new feature-based image content authentication algorithmChinese Journal of Computers 2005 28(1)105112(in Chinese)
7. Wo Y Han G Q Zhang J W et al.New image content authentication algorithm basedon wavelet transform and morphologicJournalon Communications 2005 26(8)915(in Chinese)
8. Wo Y Han G Q Blind watermarking algorithmbased on wavelet transform and visual perception characteristicsJournal of South China University of Technology (NaturalScience Edition) 2005 33(4)2933(in Chinese)
9. Burt P Adelson E The Laplacian pyramid as acompact image codeIEEE Transactions onCommunications 1983 31(4)532540. doi:10.1109/TCOM.1983.1095851
10. Song J Delp E J A generalization of morphologicalfilters using multiple structuring elementsIEEE International Symposium on Circuits and Systems 1989 2(3)991994. doi:10.1109/ISCAS.1989.100518
PDF(435 KB)

Accesses

Citations

Detail

Sections
Recommended

/