Please wait a minute...
Frontiers of Electrical and Electronic Engineering

ISSN 2095-2732

ISSN 2095-2740(Online)

CN 10-1028/TM

Front. Electr. Electron. Eng.    2008, Vol. 3 Issue (2) : 188-193    https://doi.org/10.1007/s11460-008-0046-y
Image content authentication technique based on Laplacian Pyramid
WO Yan, HAN Guoqiang
School of Computer Science and Engineering, South China University of Technology;
 Download: PDF(435 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract This paper proposes a technique of image content authentication based on the Laplacian Pyramid to verify the authenticity of image content. First, the image is decomposed into Laplacian Pyramid before the transformation. Next, the smooth and detail properties of the original image are analyzed according to the Laplacian Pyramid, and the properties are classified and encoded to get the corresponding characteristic values. Then, the signature derived from the encrypted characteristic values is embedded in the original image as a watermark. After the reception, the characteristic values of the received image are compared with the watermark drawn out from the image. The algorithm automatically identifies whether the content is tampered by means of morphologic filtration. The information of tampered location is p resented at the same time. Experimental results show that the proposed authentication algorithm can effectively detect the event and location when the original image content is tampered. Moreover, it can tolerate some distortions produced by compression, filtration and noise degradation.
Issue Date: 05 June 2008
 Cite this article:   
HAN Guoqiang,WO Yan. Image content authentication technique based on Laplacian Pyramid[J]. Front. Electr. Electron. Eng., 2008, 3(2): 188-193.
 URL:  
https://academic.hep.com.cn/fee/EN/10.1007/s11460-008-0046-y
https://academic.hep.com.cn/fee/EN/Y2008/V3/I2/188
1 Wong P W Memon N Secret and public key imagewatermarking schemes for image authentication and ownership verificationIEEE Transactions on Image Processing 2001 10(10)15931601.
doi:10.1109/83.951543
2 Memon N Vora P Yeo B L et al.Distortion bounded authentication techniquesIn: Proceedings of the SPIE on Security and Watermarkingof Multimedia Contents IISan JoseSPIE 2000 164174
3 Queluz M P TowardsRobust, content based techniques for image authenticationIEEE Second Workshop on Multimedia Signal ProcessingRedondo BeachIEEE Press 1998 297302
4 Rey C Dugelay J L Blind detection of maliciousalterations on still image using robust watermarksIEE Seminar on Secure Images and Image AuthenticationLondonIEE Press 2000 716
5 Xie L Arce G R A class of authentication digitalwatermarks for secure multimedia communicationIEEE Transactions on Image Processing 2001 10(11)17541764.
doi:10.1109/83.967402
6 Wo Y Han G Q Zhang B A new feature-based image content authentication algorithmChinese Journal of Computers 2005 28(1)105112(in Chinese)
7 Wo Y Han G Q Zhang J W et al.New image content authentication algorithm basedon wavelet transform and morphologicJournalon Communications 2005 26(8)915(in Chinese)
8 Wo Y Han G Q Blind watermarking algorithmbased on wavelet transform and visual perception characteristicsJournal of South China University of Technology (NaturalScience Edition) 2005 33(4)2933(in Chinese)
9 Burt P Adelson E The Laplacian pyramid as acompact image codeIEEE Transactions onCommunications 1983 31(4)532540.
doi:10.1109/TCOM.1983.1095851
10 Song J Delp E J A generalization of morphologicalfilters using multiple structuring elementsIEEE International Symposium on Circuits and Systems 1989 2(3)991994.
doi:10.1109/ISCAS.1989.100518
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed