Abstract
Digital multimedia makes fabricating and copying much easier than ever before. Therefore, it demands efficient and automatic techniques to identify and verify the content of digital multimedia. Image authentication is such a technique to automatically identify whether the query image is a fabrication or a simple copy of the original one. In this paper, we propose a perceptual image authentication technique based on clustering and matching of feature points of images. Feature points are first extracted from images with the k-largest local total variations and clustered using Fuzzy C-means clustering algorithm. Then, feature points in the query image and the anchor image are matched into pairs in zigzag ordering along the diagonals of the images cluster by cluster. In the mean time, the outliers of feature points are removed. Then, the system decisions about the authenticity of images are determined by the majority vote of whether three types of distance between matched feature point pairs are larger than their respective thresholds. The three types of distance include the following: (i) histogram-weighted distance, which is proposed in this paper; (ii) the normalized Euclidean distance; and (iii) the Hausdorff distance. The geometric transform between the query image and the anchor image is estimated, and the query image is registered. The possible tampered image blocks are detected, and the percentage of the tampered area is roughly estimated. The experimental results show the effectiveness and robustness of the proposed image authentication system. © 2011 John Wiley & Sons, Ltd.
| Original language | English |
|---|---|
| Pages (from-to) | 636-647 |
| Journal | Security and Communication Networks |
| Volume | 5 |
| Issue number | 6 |
| DOIs | |
| Publication status | Published - Jun 2012 |
| Externally published | Yes |
Bibliographical note
Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].Research Keywords
- Fuzzy C-means clustering
- Histogram-weighted distance
- Image authentication
- Image hashing
- Morlet wavelet