Abstract
In this paper, we propose a new image authentication algorithm using curvelet transform. In our algorithm, we apply ridgelet transform to each block which is subbanded from the image after wavelet transform. Experimental results demonstrate this algorithm has good property to localize tampering, and robust to JPEG compression.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lin, E.T., Delp, E.J.: A review of fragile image watermarks. In: Proceedings of the ACM Multimedia and Security Workshop, Orlando, pp. 25–29 (1999)
Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proceedings of the ICIP, Santa Barbara, pp. 680–683 (1997)
Holliman, N., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9, 432–441 (2000)
Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for images. In: Proceedings of the ICIP, Vancouver, pp. 446–449 (2000)
Candés, E.J.: Ridgelets: Theory and applications. Doctoral Dissertation, Department of Statistics, University of Stanford (1998)
Donoho, D.L., Duncan, M.R.: Digital curvelet transform: Strategy, implementation and experiments. In: Proceedings of the SPIE on Wavelet Applications VII, Orlando, pp. 12–29 (2000)
Starck, J.L., Cands, E.J., Dohono, D.L.: The Curvelet Transform for Image Denoising. IEEE Transactions on Image Processing 11, 670–683 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, J., Zhai, Z. (2006). Curvelet Transform for Image Authentication. In: Wang, GY., Peters, J.F., Skowron, A., Yao, Y. (eds) Rough Sets and Knowledge Technology. RSKT 2006. Lecture Notes in Computer Science(), vol 4062. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11795131_96
Download citation
DOI: https://doi.org/10.1007/11795131_96
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36297-5
Online ISBN: 978-3-540-36299-9
eBook Packages: Computer ScienceComputer Science (R0)