Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Novel Image Signature Method for Content Authentication

A Novel Image Signature Method for Content Authentication We proposed an image signature method for content authentication, which applies a hierarchical approach to construct an image signature. In the first level, DWT and DCT are used to extract image features; then these features are encrypted by using sub-keys that are generated by a cryptographically hash function. In the second level, KarhunenLoeve transformation is used to reduce the signature length. The main features of the proposed method are as follows: (i) It achieves a trade-off between robustness and tampering sensitivity. (ii) It provides a tool for image tampering detection and tampering localization. (iii) It can be used to detect the thumbnail of the large image to improve detection efficiency. (iv) It provides the compact signature, and the signature length is independent of the image size. Experimental results show that proposed method is robust for content-preserving manipulations such as JPEG compression, adding noise, filtering and Gamma correction, etc. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png The Computer Journal Oxford University Press

A Novel Image Signature Method for Content Authentication

Loading next page...
 
/lp/oxford-university-press/a-novel-image-signature-method-for-content-authentication-LeAXFTp5t6

References (30)

Publisher
Oxford University Press
Copyright
The Author 2011. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissionsoup.com
Subject
Section B
ISSN
0010-4620
eISSN
1460-2067
DOI
10.1093/comjnl/bxr108
Publisher site
See Article on Publisher Site

Abstract

We proposed an image signature method for content authentication, which applies a hierarchical approach to construct an image signature. In the first level, DWT and DCT are used to extract image features; then these features are encrypted by using sub-keys that are generated by a cryptographically hash function. In the second level, KarhunenLoeve transformation is used to reduce the signature length. The main features of the proposed method are as follows: (i) It achieves a trade-off between robustness and tampering sensitivity. (ii) It provides a tool for image tampering detection and tampering localization. (iii) It can be used to detect the thumbnail of the large image to improve detection efficiency. (iv) It provides the compact signature, and the signature length is independent of the image size. Experimental results show that proposed method is robust for content-preserving manipulations such as JPEG compression, adding noise, filtering and Gamma correction, etc.

Journal

The Computer JournalOxford University Press

Published: Jun 15, 2012

Keywords: image authentication image signature image hash tampering detection DWT-DCT; KL transformation Huffman encoding

There are no references for this article.