A content-based image authentication system with lossless data hiding

被引:0
作者
Zou, DK [1 ]
Wu, CW [1 ]
Xuan, GR [1 ]
Shi, YQ [1 ]
机构
[1] New Jersey Inst Technol, Dept ECE, Newark, NJ 07102 USA
来源
2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS | 2003年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a novel content-based image authentication framework which embeds the authentication information into the host image using a lossless data hiding approach. In this framework the features of a target image are first extracted and signed using the Digital Signature Algorithm (DSA). The authentication information is generated from the signature and the features are then inserted into the target image using a lossless data hiding algorithm. In this way, the unperturbed version of the original image can be obtained after the embedded data are extracted. An important advantage of our approach is that it can tolerate JPEG compression to a certain extent while rejecting common tampering to the image. The experimental results show that our framework works well with JPEG quality factors greater than or equal to 80 which are acceptable for most authentication applications.
引用
收藏
页码:213 / 216
页数:4
相关论文
共 10 条
[1]   Circular interpretation of histogram for reversible watermarking [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, :345-350
[2]   Distortion bounded authentication techniques [J].
Memon, N ;
Vora, P ;
Yeo, BL ;
Yeung, M .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :164-174
[3]   Towards robust, content based techniques for image authentication [J].
Queluz, MP .
1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, :297-302
[4]  
SCHNEIDER M, 1996, P ICIP 96, V3, P16
[5]  
WALTON S, 1995, DR DOBBS J, V20, P18
[6]  
WOLF W, 2001, IEEE T MULTIMEDIA, V8, P38
[7]   On the design of content-based multimedia authentication systems [J].
Wu, CW .
IEEE TRANSACTIONS ON MULTIMEDIA, 2002, 4 (03) :385-393
[8]   Limitations and requirements of content-based multimedia authentication systems [J].
Wu, CW .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 :241-252
[9]  
Wu M, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P437, DOI 10.1109/ICIP.1998.723413
[10]  
Xie LH, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P427, DOI 10.1109/ICIP.1998.723409