Image tamper detection and classification using support vector machines

被引:7
作者
Knowles, HD [1 ]
Winne, DA [1 ]
Canagarajah, CN [1 ]
Bull, DR [1 ]
机构
[1] Univ Bristol, Ctr Commun Res, Image Commun Grp, Bristol BS8 1UB, Avon, England
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2004年 / 151卷 / 04期
关键词
D O I
10.1049/ip-vis:20040750
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of robust watermarks for attack characterisation is an area of considerable potential which has been largely overlooked to date. The authors extend their earlier work on accurate attack characterisation using a double watermarking technique to include a larger library of attacks. It is shown that the complexity of the double watermarking technique can be reduced with only a very small performance penalty. A further reduction in the algorithm complexity can be achieved by removing the thresholding process from the watermark estimation procedure. Analysis of the nature and location of the characterisation errors for the above methods is also presented.
引用
收藏
页码:322 / 328
页数:7
相关论文
共 19 条
[1]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[2]  
Fridrich J, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P404, DOI 10.1109/ICIP.1998.723401
[3]  
Fukunaga K., 1990, INTRO STAT PATTERN R
[4]   A comparison of methods for multiclass support vector machines [J].
Hsu, CW ;
Lin, CJ .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2002, 13 (02) :415-425
[5]   A Bayesian approach to attack characterisation using robust watermarks [J].
Knowles, H ;
Winne, D ;
Canagarajah, N ;
Bull, D .
VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2003, PTS 1-3, 2003, 5150 :851-861
[6]   Attack characterisation of compressed images [J].
Knowles, HD ;
Winne, DA ;
Canagarajah, CN ;
Bull, DR .
ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2003, :66-67
[7]  
KNOWLES HD, 2003, P INT C VIS INF ENG, P190
[8]  
KNOWLES HD, 2003, P INT S CIRC SYST BA, V2, P959
[9]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[10]   Diversity and attack characterization for improved robust watermarking [J].
Kundur, D ;
Hatzinakos, D .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2001, 49 (10) :2383-2396