A Novel Image Signature Method for Content Authentication

被引:11
|
作者
Wang, Xiaofeng [1 ]
Zheng, Nanning [2 ]
Xue, Jianru [2 ]
Liu, Zhenli [1 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian 710048, Shaanxi, Peoples R China
[2] Xi An Jiao Tong Univ, Inst Artificial Intelligence & Robot, Xian 710049, Shaanxi, Peoples R China
来源
COMPUTER JOURNAL | 2012年 / 55卷 / 06期
基金
中国国家自然科学基金;
关键词
image authentication; image signature; image hash; tampering detection; DWT-DCT; KL transformation; Huffman encoding; TOLERANT DIGITAL SIGNATURE; ROBUST; COMPRESSION; RESILIENT; SECURE;
D O I
10.1093/comjnl/bxr108
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We proposed an image signature method for content authentication, which applies a hierarchical approach to construct an image signature. In the first level, DWT and DCT are used to extract image features; then these features are encrypted by using sub-keys that are generated by a cryptographically hash function. In the second level, Karhunen-Loeve transformation is used to reduce the signature length. The main features of the proposed method are as follows: (i) It achieves a trade-off between robustness and tampering sensitivity. (ii) It provides a tool for image tampering detection and tampering localization. (iii) It can be used to detect the thumbnail of the large image to improve detection efficiency. (iv) It provides the compact signature, and the signature length is independent of the image size. Experimental results show that proposed method is robust for content-preserving manipulations such as JPEG compression, adding noise, filtering and Gamma correction, etc.
引用
收藏
页码:686 / 701
页数:16
相关论文
共 50 条
  • [1] A Novel Robust Image-hashing Method for Content Authentication
    Jiang, Cuiling
    Pang, Yilin
    Wu, Anwen
    [J]. 2015 INTERNATIONAL SYMPOSIUM ON SECURITY AND PRIVACY IN SOCIAL NETWORKS AND BIG DATA (SOCIALSEC 2015), 2015, : 22 - 27
  • [2] A robust content based digital signature for image authentication
    Schneider, M
    Chang, SF
    [J]. INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 227 - 230
  • [3] A Contourlet-Domain Image Signature for Content Authentication
    Wang, Xiaofeng
    Zhang, Lixin
    Pang, Kemu
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 555 - 558
  • [4] A novel watermarking method with image signature
    Niu, Xiao-Li
    Liu, Ju
    Sun, Jian-De
    Qiao, Jian-Ping
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 293 - 298
  • [5] A Novel Image Authentication and Recovery Method for Applications of Image Sharing
    Liu, Chiang-Lung
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 127 - 132
  • [6] A NOVEL ALGORITHM FOR IMPROVING IMAGE CONTENT AUTHENTICATION AND LOCALIZATION ACCURACY
    Duan, Gui-Duo
    Zhao, Xi
    Ho, Anthony Ts
    [J]. 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 66 - 69
  • [7] Processing of Handwritten Signature image for Authentication
    Kim, Tai-hoon
    [J]. SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2010, 78 : 116 - 123
  • [8] Radon/ridgelet signature for image authentication
    Yao, Z
    Rajpoot, N
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 43 - 46
  • [9] Digital Signature with Localization for Image Authentication
    Kim, Mi-Ae
    Yoo, Kil-Sang
    Lee, Won-Hyung
    [J]. IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 725 - 726
  • [10] Digital signature approach for image authentication
    Bausys, R.
    Kriukovas, A.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2008, (06) : 65 - 68