Binary image authentication using zernike moments

被引:0
作者
Liu, Hongmei [1 ]
Rui, Wei [1 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun, Guangzhou 510275, Peoples R China
来源
2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7 | 2007年
关键词
binary image authentication; Zernike moments; watermark; feature vector;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we propose a content-based binary image authentication scheme. At first, we use Zernike moments magnitudes (ZMM) to generate the feature vector and demonstrate that this feature vector can represent the binary image and decide its authenticity effectively. Then the watermark is generated by quantizing ZMMs and embedded into the image. The authentication doesn't need the original watermark. The decision depends on the distance between the extracted watermark and the feature vector of the test image and a metric measure. To decrease the influence of watermarking on the feature vector, we split the binary image into two parts by a random mask, one for generating feature vector and the other for embedding water-mark. Zernike moments are usually computationally expensive, so we propose a fast algorithm. Extensive experiments show that our scheme can detect malicious attacks effectively.
引用
收藏
页码:385 / 388
页数:4
相关论文
共 11 条
  • [1] CHEN Q, 2005, ELECT COMPUT ENG, P1340
  • [2] INVARIANT IMAGE RECOGNITION BY ZERNIKE MOMENTS
    KHOTANZAD, A
    HONG, YH
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (05) : 489 - 497
  • [3] KIM H, P SIBGRAPHI 0O, P199
  • [4] Invariant image watermark-using Zernike moments
    Kim, HS
    Lee, HK
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) : 766 - 775
  • [5] Liu HM, 2005, IEEE INT SYMP CIRC S, P4014
  • [6] A hybrid watermarking scheme for video authentication
    Liu, Hongmei
    Zhu, Ling
    Huang, Jiwu
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2569 - +
  • [7] LU H, 2002, P ICPR 02, V44, P239
  • [8] LU H, 2004, P ISCAS 04, V3, P806
  • [9] ON IMAGE-ANALYSIS BY THE METHODS OF MOMENTS
    TEH, CH
    CHIN, RT
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1988, 10 (04) : 496 - 513
  • [10] Data hiding in binary image for authentication and annotation
    Wu, M
    Liu, BD
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (04) : 528 - 538