Bayesian structural content abstraction for image authentication

被引:0
|
作者
Feng, W [1 ]
Liu, ZQ [1 ]
机构
[1] City Univ Hong Kong, Ctr Media Technol, RCMT, Sch Creat Media, Hong Kong, Hong Kong, Peoples R China
关键词
Bayesian structural content abstraction (BSCA); image;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An ideal authentication approach should be able to tolerate "content preserving" operations (e.g. compression and rotation) robustly, while detecting "content altering" (e.g. object removing and replacement) modifications sensitively. Although the numerous existing algorithms can detect and locate malicious alterations to the protected image, unfortunately, most are still too fragile to resist various content-preserving manipulations for enhancing the sensitivity to content tampers. In this paper, we propose a structural content abstraction scheme within the Bayesian framework, based on which an implicit and reliable image authentication scheme can be established. Because BSCA provides a trustworthy reference which correlates highly with the content, the proposed authentication method possesses both robustness to non-content operations (NCO) and sensitivity to content operations (CO). Experimental results also
引用
收藏
页码:3999 / 4003
页数:5
相关论文
共 50 条
  • [1] Bayesian structural content abstraction for image authentication
    Feng, W
    Liu, ZQ
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2322 - 2325
  • [2] Bayesian structural content abstraction for region-level image authentication
    Feng, W
    Liu, ZQ
    [J]. TENTH IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1042 - 1047
  • [3] Region-Level Image Authentication Using Bayesian Structural Content Abstraction
    Feng, Wei
    Liu, Zhi-Qiang
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2008, 17 (12) : 2413 - 2424
  • [4] Bayesian structural content abstraction for image authentication using Markov pixon model
    Feng, W
    Liu, ZQ
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 5290 - 5296
  • [5] Spatial watermark for image content authentication
    Queluz, MP
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) : 275 - 285
  • [6] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [7] A multiple watermarks algorithm for image content authentication
    蔡立军
    李睿
    易叶青
    [J]. Journal of Central South University, 2012, 19 (10) : 2866 - 2874
  • [8] A multiple watermarks algorithm for image content authentication
    Li-jun Cai
    Rui Li
    Ye-qing Yi
    [J]. Journal of Central South University, 2012, 19 : 2866 - 2874
  • [9] A multiple watermarks algorithm for image content authentication
    Cai Li-jun
    Li Rui
    Yi Ye-qing
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2012, 19 (10) : 2866 - 2874
  • [10] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198