Region-Level Image Authentication Using Bayesian Structural Content Abstraction

被引:23
作者
Feng, Wei [1 ]
Liu, Zhi-Qiang [1 ]
机构
[1] City Univ Hong Kong, Sch Creat Media, Kowloon, Hong Kong, Peoples R China
关键词
Digital signature; graph cuts; image authentication (IA); Markov Pixon random field (MPRF); noncontent-changing operation (NCO) extension;
D O I
10.1109/TIP.2008.2006435
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image authentication (IA) verifies the integrity of image content by detecting malicious modifications. A good IA system should be able to tolerate noncontent-changing operations (NCOs) robustly, and detect content-changing operations (COs) sensitively. Most existing IA methods realize either bit-level or pixel-level authentication; thus, they can tolerate only particular and limited kinds of NCOs. In this paper, we propose an unsupervised region-level IA scheme named Bayesian structural content abstraction (BaSCA), which is capable of tolerating a wide and dynamic range of NCOs and can sensitively detect real COs. We model image structural content using the net-structured Markov Pixon random field (NS-MPRF), from which we derive the size-controllable BaSCA signature. Furthermore, to support dynamic NCO/CO partition, we present an analogous mean-shift algorithm to iteratively optimize the BaSCA signature in the user-defined NCO space. Both theoretical analysis and experimental results demonstrate that our BaSCA scheme has much less false positive and comparable false negative probability, as compared to state-of-the-art IA methods.
引用
收藏
页码:2413 / 2424
页数:12
相关论文
共 32 条
[1]  
[Anonymous], 1992, MULTIVARIATE DENSITY
[2]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[3]   An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision [J].
Boykov, Y ;
Kolmogorov, V .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2004, 26 (09) :1124-1137
[4]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[5]   Mean shift: A robust approach toward feature space analysis [J].
Comaniciu, D ;
Meer, P .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (05) :603-619
[6]  
COSTA LDF, 2001, SHAPE ANAL CLASSIFIC, P77
[7]   A tree-structured Markov random field model for Bayesian image segmentation [J].
D'Elia, C ;
Poggi, G ;
Scarpa, G .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (10) :1259-1273
[8]   A Markov pixon information approach for low-level image description [J].
Descombes, X ;
Kruggel, F .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1999, 21 (06) :482-494
[9]   Analysis and design of secure watermark-based authentication systems [J].
Fei, Chuhong ;
Kundur, Deepa ;
Kwong, Raymond H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :43-55
[10]  
Feng W, 2006, INT C PATT RECOG, P37