Robust Image Content Authentication with Tamper Location

Li Weng, Geert Braeckman, Ann Dooms, Bart Preneel

Research output: Chapter in Book/Report/Conference proceedingConference paper

12 Citations (Scopus)

Abstract

We propose a novel image authentication system by combining perceptual hashing and robust watermarking. An image is divided into blocks. Each block is represented by a compact hash value. The hash value is embedded in the block. The authenticity of the image can be verified by re-computing hash values and comparing them with the ones extracted from the image. The system can tolerate a wide range of incidental distortion, and locate tampered areas as small as 1/64 of an image. In order to have minimal interference, we design both the hash and the watermark algorithms in the wavelet domain. The hash is formed by the sign bits of wavelet coefficients. The lattice-based QIM watermarking algorithm ensures a high payload while maintaining the image quality. Extensive experiments confirm the good performance of the proposal, and show that our proposal significantly outperforms a state-of-the-art algorithm.
Original languageEnglish
Title of host publicationIEEE International Conference on Multimedia and Expo (ICME 2012)
PublisherIEEE
Pages380-385
Number of pages6
ISBN (Print)978-1-4673-1659-0
Publication statusPublished - 6 Jul 2012
Event2012 IEEE International Conference on Multimedia and Expo - Melbourne, VIC, Australia
Duration: 9 Jul 201213 Jul 2012

Conference

Conference2012 IEEE International Conference on Multimedia and Expo
Country/TerritoryAustralia
CityMelbourne, VIC
Period9/07/1213/07/12

Keywords

  • watermarking
  • perceptual hashing

Fingerprint

Dive into the research topics of 'Robust Image Content Authentication with Tamper Location'. Together they form a unique fingerprint.

Cite this