Novel image authentication scheme based on quadtree segmentation

被引:22
|
作者
Tsai, P
Hu, YC [1 ]
Chang, CC
机构
[1] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 433, Taiwan
[2] Natl United Univ, Dept Comp Sci & Informat Engn, Miaoli 360, Taiwan
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40704, Taiwan
来源
IMAGING SCIENCE JOURNAL | 2005年 / 53卷 / 03期
关键词
image authentication; digital signature; quadtree segmentation;
D O I
10.1179/136821905X50406
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
In this paper, a new image authentication scheme based on quadtree segmentation is presented. In this scheme, partial digital signature encryption is employed to ascertain the origin of the image. Furthermore, the quadtree structure is imposed on the design of the authentication code. The authentication code consists of the quadtree list and the mean values of the quadtree leaf nodes. The size of the authentication code is adaptively determined according to the image characteristics. In the experiments, JPEG and JPEG2000 lossy compression and malicious manipulations are employed to evaluate the validity of the proposed scheme. The experimental results show that this scheme permits some acceptable operations and can detect malicious manipulations. Furthermore, when a malicious manipulation is detected, the mean values of the quadtree leaf nodes can be applied to recover the manipulated areas.
引用
收藏
页码:149 / 162
页数:14
相关论文
共 50 条
  • [41] A hybrid content-based image authentication scheme
    Chen, Kai
    Zhu, Xinglei
    Zhang, Zhishou
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2007, 2007, 4810 : 226 - +
  • [42] A reversible image authentication scheme based on compressive sensing
    Xiao, Di
    Deng, Mimi
    Zhu, Xinyi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (18) : 7729 - 7752
  • [43] Image Hash Authentication Scheme Based on Composite Domain
    Song, Baolin
    Wang, Chunxing
    2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 268 - 273
  • [44] A reversible image authentication scheme based on compressive sensing
    Di Xiao
    Mimi Deng
    Xinyi Zhu
    Multimedia Tools and Applications, 2015, 74 : 7729 - 7752
  • [45] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +
  • [46] A No Reference Image Authentication Scheme Based on Digital Watermark
    Som, Sukalyan
    Mahapatra, Suman
    Sen, Sayani
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 741 - 749
  • [47] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [48] Image authentication scheme research based on fragile watermarking
    School of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
    Tien Tzu Hsueh Pao, 2007, 1 (34-39):
  • [49] A new correlation-based scheme for image authentication
    El-Sakka, MR
    Ouda, AH
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 220 - 228
  • [50] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496