{"title":"A Contourlet-Domain Image Signature for Content Authentication","authors":"Xiaofeng Wang, Lixin Zhang, Kemu Pang","doi":"10.1109/IIH-MSP.2013.143","DOIUrl":null,"url":null,"abstract":"An image signature approach for content authentication is proposed. In the proposal, Contour let transformation is used to extract image feature, and the statistics of Contour let transformation coefficients are used to generate image signature. Then a tampering detection and tampering localization algorithm are developed by using generated image signature. Proposed method is robust for perceptually insignificant distortions introduced by content-preserving manipulations such as JPEG compression, adding noise, filtering, etc. It is sensitive to the changes caused by malicious attacks, and it possesses the functionality to detect the changed image regions.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":" 40","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2013.143","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
An image signature approach for content authentication is proposed. In the proposal, Contour let transformation is used to extract image feature, and the statistics of Contour let transformation coefficients are used to generate image signature. Then a tampering detection and tampering localization algorithm are developed by using generated image signature. Proposed method is robust for perceptually insignificant distortions introduced by content-preserving manipulations such as JPEG compression, adding noise, filtering, etc. It is sensitive to the changes caused by malicious attacks, and it possesses the functionality to detect the changed image regions.