A Content-Based Image Authentication SystemWith Lossless Data Hiding.ppt

A Content-Based Image Authentication SystemWith Lossless Data Hiding.ppt

  1. 1、本文档共16页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A Content-Based Image Authentication SystemWith Lossless Data Hiding

A Content-Based Image Authentication System With Lossless Data Hiding Authors: Dekun Zou, Chai Wah Wu, Guorong Xuan, Yun Q. Shi Source : Multimedia and Expo, 2003. ICME 03. Proceedings. 2003 International Conference on ,? Volume: 2 ,?6-9 July 2003 Pages:213 – 216 Speaker: Jui-Yi Chang Advisor: Chin-Chen Chang Date: 2004/4/28 outline Introduction Generation of information for authentication Tag embedding Verification procedure Experiment results Conclusions Introduction Authentication of multimedia data provides an answer to protect the data integrity of it. Two problem: a. How tolerant is it to minor modifications? b. how hard is it to forge an authentic image? Extend the approach in the other papers to watermarking or data hiding solutions by combining it with a lossless data hiding technique and demonstrate its robustness and effectiveness. Generation of information for authentication Tag Embedding (Cont.) Using circular histogram algorithm. Divided into 8 by 8 blocks. The 64 pixels in each block are pseudo-randomly equally divided into group A and B. For each group, the histogram of the gray scale value is mapped onto circle. The gray level of pixels is quantized into Q ranges. The size of a range is P=256/Q. Tag Embedding (Cont.) Tag Embedding (Cont.) Tag Embedding (Cont.) To embed “1” C’=C+P for pixels in group A C’=C-P for pixels in group B To embed “0” C’=C-P for pixels in group A C’=C+P for pixels in group B Tag Embedding (Cont.) The centers of mass of group A and group B may be so far away that error will occur when extracting. To avoid this problem, such blocks are skipped when embedding information. Verification procedure Verification procedure (Cont.) Result in failure of the verification: (a) if the image is degraded too much so that the embedded tag could not be extracted correctly. (b) When the tag extraction is correct, but the image is corrupted such that the quantized features do not verify with the extracted signature S. Experiment

您可能关注的文档

文档评论(0)

l215322 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档