A color image authentication method using partitioned palette and morphological operations

被引:8
作者
Chang, Chin-Chen [1 ,2 ]
Lin, Pei-Yu [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
image authentication; tamper-proofing; palette; morphological operation;
D O I
10.1093/ietisy/e91-d.1.54
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image authentication is applied to protect the integrity of the digital image. Conventional image authentication mechanisms, however, are unfit for the palette-based color images. Palette-based color images such as GIF images are commonly used for media communications. This article proposes a palette-based color image authentication mechanism. This novel scheme can guarantee the essentials of general authentication schemes to protect palette-based color images. Morphological operations are adopted to draw out the tampered area precisely. According to the experimental results, the images embedded with the authentication data still can preserve high image quality; specifically, the new scheme is highly sensitive to altered areas.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 18 条
[1]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[2]   An efficient image authentication method based on Hamming code [J].
Chan, Chi-Shiang ;
Chang, Chin-Chen .
PATTERN RECOGNITION, 2007, 40 (02) :681-690
[3]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P431
[4]  
Gray R. M., 1984, IEEE ASSP Magazine, V1, P4, DOI 10.1109/MASSP.1984.1162229
[5]   Digital watermarking of images using neural networks [J].
Hwang, MS ;
Chang, CC ;
Hwang, KF .
JOURNAL OF ELECTRONIC IMAGING, 2000, 9 (04) :548-555
[6]  
Jo M, 2002, IEICE T INF SYST, VE85D, P1054
[7]   Watermarking text document images using edge direction histograms [J].
Kim, YW ;
Oh, IS .
PATTERN RECOGNITION LETTERS, 2004, 25 (11) :1243-1251
[8]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[9]   A hierarchical digital watermarking method for image tamper detection and recovery [J].
Lin, PL ;
Hsieh, CK ;
Huang, PW .
PATTERN RECOGNITION, 2005, 38 (12) :2519-2529
[10]   ALGORITHM FOR VECTOR QUANTIZER DESIGN [J].
LINDE, Y ;
BUZO, A ;
GRAY, RM .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (01) :84-95