Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication

نویسندگان

  • Shuiming Ye
  • Qibin Sun
  • Ee-Chien Chang
چکیده

Content-based image authentication typically assesses authenticity based on a distance measure between the image to be tested and its original. Commonly employed distance measures such as the Minkowski measures (including Hamming and Euclidean distances) may not be adequate for content-based image authentication since they do not exploit statistical and spatial properties in features. This paper proposes a feature distance measure for content-based image authentication based on statistical and spatial properties of the feature differences. The proposed statisticsand spatiality-based measure (SSM ) is motivated by an observation that most malicious manipulations are localized whereas acceptable manipulations result in global distortions. A statistical measure, kurtosis, is used to assess the shape of the feature difference distribution; a spatial measure, the maximum connected component size, is used to assess the degree of object concentration of the feature differences. The experimental results have confirmed that our proposed measure is better than previous measures in distinguishing malicious manipulations from acceptable ones.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Improving the quality of images synthesized by discrete cosines transform – regression based method using principle component analysis

  Purpose: Different views of an individuals’ image may be required for proper face recognition.   Recently, discrete cosines transform (DCT) based method has been used to synthesize virtual   views of an image using only one frontal image. In this work the performance of two different   algorithms was examined to produce virtual views of one frontal image.   Materials and Methods: Two new meth...

متن کامل

Feature Selection Using Multi Objective Genetic Algorithm with Support Vector Machine

Different approaches have been proposed for feature selection to obtain suitable features subset among all features. These methods search feature space for feature subsets which satisfies some criteria or optimizes several objective functions. The objective functions are divided into two main groups: filter and wrapper methods.  In filter methods, features subsets are selected due to some measu...

متن کامل

Evaluation of Similarity Measures for Template Matching

Image matching is a critical process in various photogrammetry, computer vision and remote sensing applications such as image registration, 3D model reconstruction, change detection, image fusion, pattern recognition, autonomous navigation, and digital elevation model (DEM) generation and orientation. The primary goal of the image matching process is to establish the correspondence between two ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Trans. Data Hiding and Multimedia Security

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2007