Advanced Search
Volume 26 Issue 5
May  2004
Turn off MathJax
Article Contents
Zhang Xiao-hua, Liu Fang, Jiao Li-cheng . Effective Image Authentication Algorithm Based on Image Halftone Technique[J]. Journal of Electronics & Information Technology, 2004, 26(5): 685-689.
Citation: Zhang Xiao-hua, Liu Fang, Jiao Li-cheng . Effective Image Authentication Algorithm Based on Image Halftone Technique[J]. Journal of Electronics & Information Technology, 2004, 26(5): 685-689.

Effective Image Authentication Algorithm Based on Image Halftone Technique

  • Received Date: 2003-01-04
  • Rev Recd Date: 2003-06-03
  • Publish Date: 2004-05-19
  • Based on the image halftone technique, a new effective image authentication algorithm is proposed with self repairing ability. First, the original image is quantized by 4 bit based 011 the error diffusion image halftone, and then the result is permuted by chaos operator, at the same time the halftone color set is constructed with the least quantization error. Next, the permuted image is hidden into the original image based on the error diffusion watermark algorithm. When the watermarked image is received, to verify the authenticity of the received image, the hidden information is extracted out from the received image and permuted inversely. If the received image is similar to the extracted information, the received image is creditable, else that is to say, there exists a local region that is dissimilarity, i.e. the region is tampered, according to corresponding region of extracted information, the tampered region is repaired. Finally, experimental result to demonstrate the effectiveness of the proposed image authentication technique is presented.
  • loading
  • Queluz M P. Content-based integrity protection of digital images. in SPIE Conf., Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, 3657: 85-93.[2]Fridrich J. Image watermarking for tamper detection. in Proc. IEEE Int. Conf. Image Processing,Chicago, IL, Oct. 1998: 404-408.[3]Bhattacharjee S, Kutter M. Compression tolerant image authentication. in Proc. IEEE Int.Conf. Image Processing, Chicago, IL, Oct. 1998: 435-439.[4]Ching-Yung Lin. A robust image authentication method distinguishing JPEG compression from Malicious Manipulation[J].IEEE Trans. on Circuits and System of Video Technology.2001, 11(2):153-168[5]Murat Mese, vaidyanathan P P. Pecent advance in digital halftoning and inverse halftoning methods. IEEE Trans. on CAS, 2001, 49(6): 790-805.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1931) PDF downloads(593) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return