Abstract
In this paper, we present a novel fingerprinting method for image authentication, the fingerprint length of which is very short (only 81 bytes) and independent on image sizes. First, we extract features based on the block DCT coefficients of images, and binarize the feature map to get key blocks. Then we apply Principal Components Analysis (PCA) to the DCT Coefficients of key blocks. Finally, we take the quantized eigenvector matrix (9×9) as fingerprints. Experimental results show that the proposed method is discriminative, robust against compression, and sensitive to malicious modifications.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Seoa, J.S., Haitsmab, J., Kalkerb, T., Yoo, C.D.: A robust image fingerprinting system using the Radon transform. Signal Processing: Image Communication 19(4), 325–339 (2004)
Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When seeing isn’t believing - multimedia authentication technologies. Signal Processing Magazine, IEEE 21(2), 40–49 (2004)
Lin, C.-Y., Chang, S.-F.: Robust digital signature for multimedia authentication. Circuits and Systems Magazine, IEEE 3(4), 23–26 (2003)
Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proceedings of IEEE ICIP 1996, Lausanne, Switzerland, October 1996, vol. 3, pp. 227–230 (1996)
Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proceedings of the IEEE ICIP 1998, Chicago, IL (October 1998)
Lou, D.C., Liu, J.L.: Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics 46(1), 31–39 (2000)
Queluz, M.P.: Authentication of digital images and video: generic models and a new contribution. Signal Processing: Image Communication 16(5), 461–475 (2001)
Lin, C.-Y., Chang, S.-F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153–168 (2001)
Edward Jackson, J.: A User’s Guide to Principal Components, pp. 1–25. John Wiley & Sons, Inc, Chichester (1991)
Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Processing 17(5), 58–64 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tang, S., Li, J.T., Zhang, Y.D. (2005). Compact and Robust Fingerprints Using DCT Coefficients of Key Blocks. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds) Pattern Recognition and Image Analysis. IbPRIA 2005. Lecture Notes in Computer Science, vol 3523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11492542_64
Download citation
DOI: https://doi.org/10.1007/11492542_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26154-4
Online ISBN: 978-3-540-32238-2
eBook Packages: Computer ScienceComputer Science (R0)