A proposed method on painting authentication using contourelet transform (PAUCT)

R. Karki, Abeer Alsadoon, P. W.C. Prasad, A. M. S. Rahma, A. Elchouemi

Research output: Book chapter/Published conference paperConference paperpeer-review


This paper presents a method based on contour let transform for the purpose of art authentication. The sample digital images from the different artist are converted to the gray scale images. The background patches from the gray scale images are extracted. The extracted patches are transformed using Contourelet transform and modeled using Hidden Markov Tree (HMT). The fisher distance information is calculated to measure for stylistic similarity between the brushwork of the artist. The result obtained is analyzed to determine the authenticity of the paintings. In this method we have analyzed different current existing solutions determine their limitations and propose a new hybrid method that can overcome those limitations. It is tested on the sample of twenty images of the paintings, consisting of the paintings from the Van Gog and other artist separated as the Van Gog and Non Van Gog paintings.
Original languageEnglish
Title of host publication2016 7th International conference on information and communication systems, ICICS 2016
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages4
ISBN (Electronic)9781467386142
Publication statusPublished - 23 May 2016
Event7th International Conference on Information and Communication Systems, ICICS 2016 - Jordan University of Science and Technology, Irbid, Jordan
Duration: 05 Apr 201607 Apr 2016
https://web.archive.org/web/20160305231301/http://www.icics.info/icics2016/ (conference website)
http://toc.proceedings.com/30459webtoc.pdf (proceedings TOC)
https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7468594 (full conference proceedings)


Conference7th International Conference on Information and Communication Systems, ICICS 2016
OtherThe International Conference on Information and Communication Systems (ICICS 2016) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments, and applications in all areas of Computer and Information Sciences. The topics that will be covered in the ICICS 2016 include, but are not limited to: Artificial Intelligence, Mobile Computing, Networking, Information Security and Cryptography, Intrusion Detection and Computer Forensics, Web Content Mining, Bioinformatics and IT Applications, Database Technology, Systems Integration, Information Systems Analysis and Specification, Communications, and Human-Computer Interaction.
Internet address


Dive into the research topics of 'A proposed method on painting authentication using contourelet transform (PAUCT)'. Together they form a unique fingerprint.

Cite this