Advanced Search
Volume 27 Issue 1
Jan.  2005
Turn off MathJax
Article Contents
Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng. Effective Image Authentication Technique Based on the Interested Region[J]. Journal of Electronics & Information Technology, 2005, 27(1): 31-34.
Citation: Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng. Effective Image Authentication Technique Based on the Interested Region[J]. Journal of Electronics & Information Technology, 2005, 27(1): 31-34.

Effective Image Authentication Technique Based on the Interested Region

  • Received Date: 2003-03-24
  • Rev Recd Date: 2003-10-28
  • Publish Date: 2005-01-19
  • Information authentication technique is an important inspects of network security, and its motive lies in authentication of the integrity and creditability of information. Based on the analysis of the previous image authentication techniques, a new effective image authentication technique is proposed based on the interested region. Firstly, the original image is divided into a certain size preliminary image blocks. Then on the basis of the interested region given by users, the preliminary image block is divided into smaller blocks, at the same time the signature of each image block is extracted. Finally the signature of image blocks is embedded into intermediate frequency coefficient of image blocks. Experimental results are provided to demonstrate the effectiveness, self-adaptability, and validity of the method.
  • loading
  • ISO/IEC JTC 1/SC 29/WG 1 ISO/IEC FCD 15444-1: Coding of Still Pictures. Mar, 2000, http:∥www.jpeg.org/FCD15444-1 .htm.[2]Lin Ching-Yung, Chang Shih-Fu. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems of Video Technology, 2001, 1(2): 153- 168.[3]Bhattacharjee S, Kutter M. Compression tolerant image authentication, Proc. IEEE Int. Conf. Image Processing, Chicago,1998, vol. l: 435 - 439.[4]Queluz M P. Content-based integrity protection of digital images,SPIE Conf. Security and Watermarking of Multimedia, San Jose,1999, Vol.3657:85 - 93.[5]Costa M H M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-[6]Chen B,Wornell G. Preprocessed and post processed quantization index modulation methods for digital watermarking, Proc. of SPIE, San Jose, 2000, Vol.3971:48 - 59.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2218) PDF downloads(691) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return