期刊文献+

一种新的基于特征的图像内容认证方法 被引量:32

A New Feature-Based Image Content Authentication Algorithm
下载PDF
导出
摘要 该文提出了一种新的基于特征的图像内容认证方法 .它首先利用小波变换多尺度边缘检测方法抽取出光滑分量和边缘特征作为生成签名的图像特征集 .这可以保证特征集与图像之间的一一映射关系 ,避免伪造攻击 .然后它将光滑分量量化后生成 12 8位的摘要 ,并将边缘特征以水印方式嵌入原图 .验证图像时需同时通过与摘要的对比以及与水印特征的对比来确定内容是否被篡改 .实验表明 ,该算法可有效地检测出恶意篡改及其发生的位置 ,并可容忍由压缩、滤波等操作引起的失真 .即使图像受一定噪声污染 ,它也可通过验证 . This paper presents a new feature based image content authentication algorithm. First, it draws the smooth component and edge character from the image with the algorithm of dyadic wavelet transform multi scale edge detection, and makes them the image feature set that produces the digital signatures. That can ensure the one to one mapping relationship between the feature set and the image, and avoid the counterfeit attack. Then it quantizes the smooth component to create 128 bits digest, and embeds the edge character in the original image as a watermark. Image authentication needs to contrast with the digest and watermark character to confirm whether the content is tampered. The experiment proves that this authentication algorithm can effectively detect the event and the location when the original image content is tampered viciously, and can tolerate the damage produced by compression, filter and some other image processing. Even if the image is degraded by some noise, it can still pass through the authentication.
出处 《计算机学报》 EI CSCD 北大核心 2005年第1期105-112,共8页 Chinese Journal of Computers
基金 国家自然科学基金 (10 1710 3 3 ) 广东省自然科学基金 (3 13 40 ) 广州市科技计划项目 (2 0 0 4J1 C0 0 81) 广东省"千百十工程"优秀人才基金 (Q0 2 0 5 2 )资助 .
关键词 图像内容认证 小波变换 边缘检测 数字水印 数字签名 image content authentication wavelet transform edge detect digital watermark digital signatures
  • 相关文献

参考文献9

  • 1Wong P.W.,Memon N..A public key watermark for imag everification and authentication.In:Proceedings of the IEEE International Conference on Image Processing,Chicago,1998,1: 455-459.
  • 2Memon N.,Vora P.,Yeo B.L.,Yeung M..Distortion bounded authentication techniques.In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents II,San Jose,USA,2000,397l:164-174.
  • 3Quelue M.P..Towards robust,content based techniques forimage authentication. In: Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing,Redondo Beach,1998,297-302.
  • 4Rey C.'Dugelay J.L..Blind detection of malicious alterations on still image using robust watermarks.In:IEE Seminar on Secure Images and Image Authentication.London,2000,7/1-7/6.
  • 5Xie Lie-Hua, Arce G.R.. A class of authentication digital Watermarks for secure multimedia communication.IEEEtransactions on Image Processing,2001,10(11):1754-1764.
  • 6Mallat S..Zhong S.Charactedzation of signals from multiscale edges.IEEE Transactions on Pattern Analysis and Machine Intelligence,1992,14(7):710-732.
  • 7Mallat S..A Wavelet Tour of Signal Processing.Second Edition.Beijing;China Machine Press'2002.
  • 8Zhang Lei,Bao Paul.Edge detection by scale multiplication in wavelet domain.Pattern Recognition Letters,2002,23(12):1771-1784.
  • 9Rivest R.L..The MD5 message digest algorithm.MIT Laboratory for Computer Science and RSA Data Security,Internet Engineering Task Force(IETF),RFC 1321,1992,37.

同被引文献244

引证文献32

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部