Content-based authentication algorithm for binary images

This paper proposes a content-based authentication scheme for tampering detection and localization of binary images. The watermark is generated by the feature vector of the original binary image, and embedded back into the image by a structural method. The feature vector we used is Zernike moments. It can tell the degree of the tamper in the binary image. A distance between two feature vectors is defined. We authenticate image by the distance between the extracted watermark and the feature vector of the test image. Once the tampering is detected, we can locate the tampered areas by comparing different components of the distance. The experimental results show that the algorithm can locate the tamper effectively.

[1]  Heung-Kyu Lee,et al.  Invariant image watermark using Zernike moments , 2003, IEEE Trans. Circuits Syst. Video Technol..

[2]  Wen-Hsiang Tsai,et al.  A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement , 2003, IEEE Communications Letters.

[3]  Peng Jia-xiong,et al.  Improvement and invariance analysis of Zernike moments using as a region-based shape descriptor , 2002, Proceedings. XV Brazilian Symposium on Computer Graphics and Image Processing.

[4]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[5]  Jiwu Huang,et al.  Binary Image Authentication using Zernike Moments , 2007, 2007 IEEE International Conference on Image Processing.

[6]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[7]  Jana Dittmann Content-fragile watermarking for image authentication , 2001, IS&T/SPIE Electronic Imaging.

[8]  Chao Yu,et al.  Watermark embedding in binary images for authentication , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[9]  Alireza Khotanzad,et al.  Invariant Image Recognition by Zernike Moments , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[11]  Hae Yong Kim,et al.  Secure authentication watermarking for binary images , 2003, 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003).