Skip to main content

A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ

  • Conference paper
Advances in Multimedia Information Processing – PCM 2007 (PCM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4810))

Included in the following conference series:

Abstract

We present an image authentication scheme based on feature extraction and codeword clustering in this paper. The two-level detections can be performed progressively based on the requirements of the authenticator. In order to generate these two-level authentication codes, the quad-tree segmentation and clustered VQ techniques are used. Using the first-level authentication code, the malicious tampered areas can be detected and located. In the second-level, it not only provides a more rigid detection of tampered areas but also can further remedy them. According to the experimental results, our scheme can correctly detect the malicious tampering and tolerate some incidental modifications, and then successfully remedy the tampered area. In addition, the space cost of authentication code is quite little.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, C.S., Chang, C.C.: An Efficient Image Authentication Method Based on Hamming Code. Pattern Recognition 40(2), 681–690 (2006)

    Article  MathSciNet  Google Scholar 

  2. Lin, P.L., Hsieh, C.K., Huang, P.W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery. Pattern Recognition 38, 2519–2529 (2005)

    Article  Google Scholar 

  3. Wang, H., He, C., Ding, K.: Quadtrees-based Image Authentication Technique,” IEICE Transactions on Fundamentals. IEICE Transactions on Fundamentals E87-A(4), 946–948 (2004)

    Google Scholar 

  4. Gray, R.M.: Vector Quantization. IEEE Transactions on Acoustics, Speech, and Signal Processing 1, 4–29 (1984)

    Google Scholar 

  5. Linde, Y., Buzo, A., Gray, B.M.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications 28(1), 84–95 (1980)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Horace H.-S. Ip Oscar C. Au Howard Leung Ming-Ting Sun Wei-Ying Ma Shi-Min Hu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, CC., Tsou, CC., Chou, YC. (2007). A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77255-2_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77254-5

  • Online ISBN: 978-3-540-77255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics