Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng. Effective Image Authentication Technique Based on the Interested Region[J]. Journal of Electronics & Information Technology, 2005, 27(1): 31-34.
Citation:
Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng. Effective Image Authentication Technique Based on the Interested Region[J]. Journal of Electronics & Information Technology, 2005, 27(1): 31-34.
Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng. Effective Image Authentication Technique Based on the Interested Region[J]. Journal of Electronics & Information Technology, 2005, 27(1): 31-34.
Citation:
Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng. Effective Image Authentication Technique Based on the Interested Region[J]. Journal of Electronics & Information Technology, 2005, 27(1): 31-34.
Information authentication technique is an important inspects of network security, and its motive lies in authentication of the integrity and creditability of information. Based on the analysis of the previous image authentication techniques, a new effective image authentication technique is proposed based on the interested region. Firstly, the original image is divided into a certain size preliminary image blocks. Then on the basis of the interested region given by users, the preliminary image block is divided into smaller blocks, at the same time the signature of each image block is extracted. Finally the signature of image blocks is embedded into intermediate frequency coefficient of image blocks. Experimental results are provided to demonstrate the effectiveness, self-adaptability, and validity of the method.
ISO/IEC JTC 1/SC 29/WG 1 ISO/IEC FCD 15444-1: Coding of Still Pictures. Mar, 2000, http:∥www.jpeg.org/FCD15444-1 .htm.[2]Lin Ching-Yung, Chang Shih-Fu. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems of Video Technology, 2001, 1(2): 153- 168.[3]Bhattacharjee S, Kutter M. Compression tolerant image authentication, Proc. IEEE Int. Conf. Image Processing, Chicago,1998, vol. l: 435 - 439.[4]Queluz M P. Content-based integrity protection of digital images,SPIE Conf. Security and Watermarking of Multimedia, San Jose,1999, Vol.3657:85 - 93.[5]Costa M H M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-[6]Chen B,Wornell G. Preprocessed and post processed quantization index modulation methods for digital watermarking, Proc. of SPIE, San Jose, 2000, Vol.3971:48 - 59.