Indexed by:
Abstract:
We proposed an image signature method for content authentication, which applies a hierarchical approach to construct an image signature. In the first level, DWT and DCT are used to extract image features; then these features are encrypted by using sub-keys that are generated by a cryptographically hash function. In the second level, Karhunen-Loeve transformation is used to reduce the signature length. The main features of the proposed method are as follows: (i) It achieves a trade-off between robustness and tampering sensitivity. (ii) It provides a tool for image tampering detection and tampering localization. (iii) It can be used to detect the thumbnail of the large image to improve detection efficiency. (iv) It provides the compact signature, and the signature length is independent of the image size. Experimental results show that proposed method is robust for content-preserving manipulations such as JPEG compression, adding noise, filtering and Gamma correction, etc.
Keyword:
Reprint Author's Address:
Email:
Source :
COMPUTER JOURNAL
ISSN: 0010-4620
Year: 2012
Issue: 6
Volume: 55
Page: 686-701
0 . 7 5 5
JCR@2012
1 . 4 9 4
JCR@2020
ESI Discipline: COMPUTER SCIENCE;
ESI HC Threshold:154
JCR Journal Grade:3
CAS Journal Grade:4
Cited Count:
WoS CC Cited Count: 8
SCOPUS Cited Count: 13
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 5
Affiliated Colleges: