Skip to main content
Log in

Image content authentication technique based on Laplacian Pyramid

  • Research Article
  • Published:
Frontiers of Electrical and Electronic Engineering in China

Abstract

This paper proposes a technique of image content authentication based on the Laplacian Pyramid to verify the authenticity of image content. First, the image is decomposed into Laplacian Pyramid before the transformation. Next, the smooth and detail properties of the original image are analyzed according to the Laplacian Pyramid, and the properties are classified and encoded to get the corresponding characteristic values. Then, the signature derived from the encrypted characteristic values is embedded in the original image as a watermark. After the reception, the characteristic values of the received image are compared with the watermark drawn out from the image. The algorithm automatically identifies whether the content is tampered by means of morphologic filtration. The information of tampered location is p resented at the same time. Experimental results show that the proposed authentication algorithm can effectively detect the event and location when the original image content is tampered. Moreover, it can tolerate some distortions produced by compression, filtration and noise degradation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 2001, 10(10): 1593–1601

    Article  MATH  Google Scholar 

  2. Memon N, Vora P, Yeo B L, et al. Distortion bounded authentication techniques. In: Proceedings of the SPIE on Security and Watermarking of Multimedia Contents II. San Jose: SPIE, 2000, 164–174

    Google Scholar 

  3. Queluz M P. Towards Robust, content based techniques for image authentication. IEEE Second Workshop on Multimedia Signal Processing, Redondo Beach. IEEE Press, 1998, 297–302

  4. Rey C, Dugelay J L. Blind detection of malicious alterations on still image using robust watermarks. IEE Seminar on Secure Images and Image Authentication, London. IEE Press, 2000, 7: 1–6

    Google Scholar 

  5. Xie L, Arce G R. A class of authentication digital watermarks for secure multimedia communication. IEEE Transactions on Image Processing, 2001, 10(11): 1754–1764

    Article  MATH  Google Scholar 

  6. Wo Y, Han G Q, Zhang B. A new feature-based image content authentication algorithm. Chinese Journal of Computers, 2005, 28(1): 105–112 (in Chinese)

    Google Scholar 

  7. Wo Y, Han G Q, Zhang JW, et al. New image content authentication algorithm based on wavelet transform and morphologic. Journal on Communications, 2005, 26(8): 9–15 (in Chinese)

    Google Scholar 

  8. Wo Y, Han G Q. Blind watermarking algorithm based on wavelet transform and visual perception characteristics. Journal of South China University of Technology (Natural Science Edition), 2005, 33(4): 29–33 (in Chinese)

    Google Scholar 

  9. Burt P, Adelson E. The Laplacian pyramid as a compact image code. IEEE Transactions on Communications, 1983, 31(4): 532–540

    Article  Google Scholar 

  10. Song J, Delp E J. A generalization of morphological filters using multiple structuring elements. IEEE International Symposium on Circuits and Systems, 1989, 2(3): 991–994

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Wo.

Additional information

__________

Translated from Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 34–38 [译自: 华南理工大学学报(自然科学版)]

About this article

Cite this article

Wo, Y., Han, G. Image content authentication technique based on Laplacian Pyramid. Front. Electr. Electron. Eng. Ch 3, 188–193 (2008). https://doi.org/10.1007/s11460-008-0046-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11460-008-0046-y

Keywords

Navigation