Skip to main content

Compact and Robust Fingerprints Using DCT Coefficients of Key Blocks

  • Conference paper
Pattern Recognition and Image Analysis (IbPRIA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 3523))

Included in the following conference series:

  • 1674 Accesses

Abstract

In this paper, we present a novel fingerprinting method for image authentication, the fingerprint length of which is very short (only 81 bytes) and independent on image sizes. First, we extract features based on the block DCT coefficients of images, and binarize the feature map to get key blocks. Then we apply Principal Components Analysis (PCA) to the DCT Coefficients of key blocks. Finally, we take the quantized eigenvector matrix (9×9) as fingerprints. Experimental results show that the proposed method is discriminative, robust against compression, and sensitive to malicious modifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Seoa, J.S., Haitsmab, J., Kalkerb, T., Yoo, C.D.: A robust image fingerprinting system using the Radon transform. Signal Processing: Image Communication 19(4), 325–339 (2004)

    Article  Google Scholar 

  2. Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When seeing isn’t believing - multimedia authentication technologies. Signal Processing Magazine, IEEE 21(2), 40–49 (2004)

    Article  Google Scholar 

  3. Lin, C.-Y., Chang, S.-F.: Robust digital signature for multimedia authentication. Circuits and Systems Magazine, IEEE 3(4), 23–26 (2003)

    Article  MathSciNet  Google Scholar 

  4. Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proceedings of IEEE ICIP 1996, Lausanne, Switzerland, October 1996, vol. 3, pp. 227–230 (1996)

    Google Scholar 

  5. Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proceedings of the IEEE ICIP 1998, Chicago, IL (October 1998)

    Google Scholar 

  6. Lou, D.C., Liu, J.L.: Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics 46(1), 31–39 (2000)

    Article  Google Scholar 

  7. Queluz, M.P.: Authentication of digital images and video: generic models and a new contribution. Signal Processing: Image Communication 16(5), 461–475 (2001)

    Article  Google Scholar 

  8. Lin, C.-Y., Chang, S.-F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153–168 (2001)

    Article  MathSciNet  Google Scholar 

  9. Edward Jackson, J.: A User’s Guide to Principal Components, pp. 1–25. John Wiley & Sons, Inc, Chichester (1991)

    Book  MATH  Google Scholar 

  10. Petitcolas, F.A.P.: Watermarking schemes evaluation. IEEE Signal Processing 17(5), 58–64 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tang, S., Li, J.T., Zhang, Y.D. (2005). Compact and Robust Fingerprints Using DCT Coefficients of Key Blocks. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds) Pattern Recognition and Image Analysis. IbPRIA 2005. Lecture Notes in Computer Science, vol 3523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11492542_64

Download citation

  • DOI: https://doi.org/10.1007/11492542_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26154-4

  • Online ISBN: 978-3-540-32238-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics