期刊文献+

基于特征的静态图像内容认证方法 被引量:3

A Feature-based Still Image Content Authentication Algorithm
下载PDF
导出
摘要 为了对受攻击的图像进行有效的认证,该文提出了一种基于特征的图像内容认证方法,该方法首先利用小波变换多尺度边缘检测方法抽取出光滑分量和边缘特征来作为生成签名的图像特征集,以保证特征集与图像之间的一一映射关系和避免伪造攻击;然后将光滑分量用32bit编码后与边缘特征以水印方式嵌入原图。验证图像时,需同时验证光滑特征和边缘特征,以确定图像内容是否被篡改。实验表明,该算法不仅可有效地检测出恶意篡改及其发生的位置,并可容忍由压缩、滤波等操作引起的失真,即使图像受到一定噪声污染时,它也可通过验证。 This paper presents a new image content authentication algorithm based on image feature for effectively authenticate the tampered image. First the smooth-component and edge-character are drawn from the image with the dyadic wavelet transform multi-scale edge detection, which form an image feature set for generating the digital signatures. This can ensure the one-to-one mapping relationship between the feature set and the image, and avoid the counterfeit attack. After 32 bits coding, the smooth-component is embedded in the original image with the edge-character as watermark. When the image is verified, the smooth character and edge character are compared to confirm whether the content has been tampered. The experiments prove that this authentication algorithm can effectively detect the event and the location of vicious tamper, and it can also tolerate the damage produced by compression, filter and some other image procession. Even if the image is degraded by some noise, it can still pass through the authentication correctly.
出处 《中国图象图形学报》 CSCD 北大核心 2006年第7期1036-1042,共7页 Journal of Image and Graphics
基金 国家自然科学基金项目(60573019) 广东省自然科学基金重点项目(05103541) 广东省自然科学基金博士科研启动基金项目(05300198)
关键词 图像内容认证 多尺度边缘 小波变换 数字水印 image content authentication, multiscale edges, wavelet transform, digital watermark
  • 相关文献

参考文献8

  • 1Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10 (10):1593 ~ 1601.
  • 2Memon N,Vora P,Yeo B L,et al.Distortion bounded authentication techniques[A].In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents Ⅱ[C],San Jose,CA,USA,2000,3971:164 ~ 174.
  • 3Quelue M P.Towards robust,content based techniques for image authentication[A].In:Proceedings of IEEE Second Workshop on Multimedia Signal Processing[C],Redondo Beach,California,USA,1998:297 ~ 302.
  • 4Rey C,Dugelay J L.Blind detection of malicious alterations on still image using robust watermarks[A].In:IEE Seminar on Secure Images and Image Authentication[C],London,UK,2000,7:1 ~ 6.
  • 5Xie Liehua,Arce G R.A class of authentication digital watermarks for secure multimedia communication[J].IEEE Transactions on Image Processing,2001,10(11):1754 ~ 1764.
  • 6沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005,28(1):105-112. 被引量:32
  • 7Mallat S,Zhong S.Characterization of signals from multiscale edges[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1992,14 (7):710 ~ 732.
  • 8MallatS 杨力华 戴道清 黄文良 等译.信号处理的小波导引[M].北京:机械工业出版社,2002..

二级参考文献9

  • 1Wong P.W.,Memon N..A public key watermark for imag everification and authentication.In:Proceedings of the IEEE International Conference on Image Processing,Chicago,1998,1: 455-459.
  • 2Memon N.,Vora P.,Yeo B.L.,Yeung M..Distortion bounded authentication techniques.In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents II,San Jose,USA,2000,397l:164-174.
  • 3Quelue M.P..Towards robust,content based techniques forimage authentication. In: Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing,Redondo Beach,1998,297-302.
  • 4Rey C.'Dugelay J.L..Blind detection of malicious alterations on still image using robust watermarks.In:IEE Seminar on Secure Images and Image Authentication.London,2000,7/1-7/6.
  • 5Xie Lie-Hua, Arce G.R.. A class of authentication digital Watermarks for secure multimedia communication.IEEEtransactions on Image Processing,2001,10(11):1754-1764.
  • 6Mallat S..Zhong S.Charactedzation of signals from multiscale edges.IEEE Transactions on Pattern Analysis and Machine Intelligence,1992,14(7):710-732.
  • 7Mallat S..A Wavelet Tour of Signal Processing.Second Edition.Beijing;China Machine Press'2002.
  • 8Zhang Lei,Bao Paul.Edge detection by scale multiplication in wavelet domain.Pattern Recognition Letters,2002,23(12):1771-1784.
  • 9Rivest R.L..The MD5 message digest algorithm.MIT Laboratory for Computer Science and RSA Data Security,Internet Engineering Task Force(IETF),RFC 1321,1992,37.

共引文献39

同被引文献18

  • 1朱从旭.实现图像版权通知、保护和内容认证的多功能水印[J].通信学报,2009,30(S2):101-104. 被引量:7
  • 2钟桦,焦李成.DCT域半易损水印技术[J].计算机学报,2005,28(9):1549-1557. 被引量:12
  • 3余淼,和红杰,张家树.一种高定位精度的安全JPEG图像认证水印算法[J].中国科学(E辑),2007,37(2):315-328. 被引量:5
  • 4谢建全,阳春华.一种像素级的图像篡改认证算法[J].计算机应用,2007,27(6):1337-1338. 被引量:8
  • 5XIE LIE-HUA, ARCE G R, GRAVEMAN R F. Approximate image message authentication codes[ J]. IEEE Transactions on Multimedia, 2001, 3(2) : 242 - 252.
  • 6Xie Liehua,Arce G R, Graveman R F.Approximate image message authentication codes[J].IEEE Trans on Multimedia, 2001,3 (2) :242-252.
  • 7Lin Chihhung,Chien Hsiaofen, Chien Shenglung.Multipurpose image authentication method based on vector quantization intelligent information hiding and multimedia signal processing[C]// Proe of IIHMSP' 08 International Conference, 15-17 Aug, 2008: 1186-1189.
  • 8Xie Rongsheng, Wu Keshuo, Li Chunguang, et al.An improved semi-fragile digital watermarking scheme for image authentication[C]//Proc of 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, 16-18 April, 2007 : 262-265.
  • 9Al-Mualla M E.Content-adaptive semi-fragile watermarking for image authentication[C]//Proc of 14th IEEE International Conference on Electronics, Circuits and Systems, 11-14 Dec, 2007: 1256-1259.
  • 10Lin Chingyung, Chang Shihfu.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transaction on Circuits and System of Video Technology, 2001,11(2) : 153-168.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部