Abstract
This paper proposes a technique of image content authentication based on the Laplacian Pyramid to verify the authenticity of image content. First, the image is decomposed into Laplacian Pyramid before the transformation. Next, the smooth and detail properties of the original image are analyzed according to the Laplacian Pyramid, and the properties are classified and encoded to get the corresponding characteristic values. Then, the signature derived from the encrypted characteristic values is embedded in the original image as a watermark. After the reception, the characteristic values of the received image are compared with the watermark drawn out from the image. The algorithm automatically identifies whether the content is tampered by means of morphologic filtration. The information of tampered location is p resented at the same time. Experimental results show that the proposed authentication algorithm can effectively detect the event and location when the original image content is tampered. Moreover, it can tolerate some distortions produced by compression, filtration and noise degradation.
Similar content being viewed by others
References
Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 2001, 10(10): 1593–1601
Memon N, Vora P, Yeo B L, et al. Distortion bounded authentication techniques. In: Proceedings of the SPIE on Security and Watermarking of Multimedia Contents II. San Jose: SPIE, 2000, 164–174
Queluz M P. Towards Robust, content based techniques for image authentication. IEEE Second Workshop on Multimedia Signal Processing, Redondo Beach. IEEE Press, 1998, 297–302
Rey C, Dugelay J L. Blind detection of malicious alterations on still image using robust watermarks. IEE Seminar on Secure Images and Image Authentication, London. IEE Press, 2000, 7: 1–6
Xie L, Arce G R. A class of authentication digital watermarks for secure multimedia communication. IEEE Transactions on Image Processing, 2001, 10(11): 1754–1764
Wo Y, Han G Q, Zhang B. A new feature-based image content authentication algorithm. Chinese Journal of Computers, 2005, 28(1): 105–112 (in Chinese)
Wo Y, Han G Q, Zhang JW, et al. New image content authentication algorithm based on wavelet transform and morphologic. Journal on Communications, 2005, 26(8): 9–15 (in Chinese)
Wo Y, Han G Q. Blind watermarking algorithm based on wavelet transform and visual perception characteristics. Journal of South China University of Technology (Natural Science Edition), 2005, 33(4): 29–33 (in Chinese)
Burt P, Adelson E. The Laplacian pyramid as a compact image code. IEEE Transactions on Communications, 1983, 31(4): 532–540
Song J, Delp E J. A generalization of morphological filters using multiple structuring elements. IEEE International Symposium on Circuits and Systems, 1989, 2(3): 991–994
Author information
Authors and Affiliations
Corresponding author
Additional information
__________
Translated from Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 34–38 [译自: 华南理工大学学报(自然科学版)]
About this article
Cite this article
Wo, Y., Han, G. Image content authentication technique based on Laplacian Pyramid. Front. Electr. Electron. Eng. Ch 3, 188–193 (2008). https://doi.org/10.1007/s11460-008-0046-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11460-008-0046-y