Content-based image authentication by feature point clustering and matching

被引:5
|
作者
Yang, Lei [1 ]
Tian, Jun [2 ]
Wu, Dapeng [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Futurewei Technol Inc, Bridgewater, NJ 08807 USA
关键词
image authentication; image hashing; Fuzzy C-means clustering; histogram-weighted distance; Morlet wavelet;
D O I
10.1002/sec.358
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital multimedia makes fabricating and copying much easier than ever before. Therefore, it demands efficient and automatic techniques to identify and verify the content of digital multimedia. Image authentication is such a technique to automatically identify whether the query image is a fabrication or a simple copy of the original one. In this paper, we propose a perceptual image authentication technique based on clustering and matching of feature points of images. Feature points are first extracted from images with the k-largest local total variations and clustered using Fuzzy C-means clustering algorithm. Then, feature points in the query image and the anchor image are matched into pairs in zigzag ordering along the diagonals of the images cluster by cluster. In the mean time, the outliers of feature points are removed. Then, the system decisions about the authenticity of images are determined by the majority vote of whether three types of distance between matched feature point pairs are larger than their respective thresholds. The three types of distance include the following: (i) histogram-weighted distance, which is proposed in this paper; (ii) the normalized Euclidean distance; and (iii) the Hausdorff distance. The geometric transform between the query image and the anchor image is estimated, and the query image is registered. The possible tampered image blocks are detected, and the percentage of the tampered area is roughly estimated. The experimental results show the effectiveness and robustness of the proposed image authentication system. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:636 / 647
页数:12
相关论文
共 50 条
  • [1] Content-based image retrieval by feature point matching
    Hsu, CT
    Wu, YT
    Chen, ALP
    [J]. STORAGE AND RETRIEVAL FOR MEDIA DATABASES 2001, 2001, 4315 : 39 - 49
  • [2] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198
  • [3] A feature level fusion in similarity matching to content-based image retrieval
    Rahman, Mahmudur
    Desai, Bipin C.
    Bhattacharya, Prabir
    [J]. 2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2006, : 748 - 753
  • [4] Content-based image retrieval with fuzzy clustering for feature vector normalization
    Van-Hieu Vu
    [J]. Multimedia Tools and Applications, 2024, 83 : 4309 - 4329
  • [5] Content-based image retrieval with fuzzy clustering for feature vector normalization
    Vu, Van-Hieu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4309 - 4329
  • [6] Hierarchical feature clustering for content-based retrieval in medical image databases
    Thies, C
    Malik, A
    Keysers, D
    Kohnen, M
    Fischer, B
    Lehmann, TM
    [J]. MEDICAL IMAGING 2003: IMAGE PROCESSING, PTS 1-3, 2003, 5032 : 598 - 608
  • [7] A hybrid content-based image authentication scheme
    Chen, Kai
    Zhu, Xinglei
    Zhang, Zhishou
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2007, 2007, 4810 : 226 - +
  • [8] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    [J]. 2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [9] A region-based fuzzy feature matching approach to content-based image retrieval
    Chen, YX
    Wang, JZ
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (09) : 1252 - 1267
  • [10] A Method for Content-Based Image Retrieval with a Two-Stage Feature Matching
    Huang, Jing
    Yang, Shuguo
    Wang, Wenwu
    [J]. 2019 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2019, : 213 - 220