An Efficient Reversible Image Authentication Method
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.
- (社)電子情報通信学会の論文
- 2008-08-01
著者
-
Fujiyoshi Masaaki
Faculty of System Design, Tokyo Metropolitan University
-
Kiya Hitoshi
Faculty of System Design, Tokyo Metropolitan University
-
Kiya Hitoshi
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
Kiya Hitoshi
Faculty Of System Design Tokyo Metropolitan University
-
Kiya Hitoshi
Department Of Information And Communication Systems Engineering Faculty Of System Design Tokyo Metro
-
Kiya Hitoshi
Tokyo Metropolitan Univ. Hachioji‐shi Jpn
-
Fujiyoshi Masaaki
Department Of Electrical Engineering Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Graduate School Of System Design Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Faculty Of System Design Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Graduate School Of Engineering Tokyo Metropolitan University
-
HAN Seungwu
Graduate School of System Design, Tokyo Metropolitan University
-
Han Seungwu
Graduate School Of System Design Tokyo Metropolitan University
-
Kiya Hitoshi
Faculty Of Engineering Tokyo Metropolitan University
関連論文
- A parameter memorization-free lossless data hiding method with flexible payload size
- Reversible Data Hiding Based on Adaptive Modulation of Statistics Invertibility
- Parallel Processing of Distributed Video Coding to Reduce Decoding Time
- Layered Low-Density Generator Matrix Codes for Super High Definition Scalable Video Coding System
- SCALABLE SCRAMBLING FOR MPEG VIDEO(International Workshop on Advanced Image Technology 2005)
- Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP(Digital Signal Processing)
- QOS ESTIMATION BASED ON PSNR FOR MOTION JPEG2000 VIDEO IN LOSSY PACKET NETWORKS(International Workshop on Advanced Image Technology 2007)
- QOS ESTIMATION BASED ON PSNR FOR MOTION JPEG2000 VIDEO IN LOSSY PACKET NETWORKS
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks(音響信号処理/一般)
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks
- Encryption of Composite Multimedia Contents for Access Control(Image,Multimedia and Mobile Signal Processing)
- A Reversible Image Authentication Method without Memorization of Hiding Parameters
- A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION(International Workshop on Advanced Image Technology 2009)
- An Efficient Reversible Image Authentication Method
- A-4-2 Applying Cipher to the Reversible Image Authentication
- Lossless Data Hiding in the Spatial Domain for High Quality Images(Selected Papers from the 19th Workshop on Circuits and Systems in Karuizawa)
- DCT Sign-Based Similarity Measure for JPEG Image Retrieval(Image)
- Fast Image Identification Methods for JPEG Images with Different Compression Ratios(Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2005))
- FAST AND ROBUST IDENTIFICATION METHODS FOR JPEG-CODED IMAGES(International Workshop on Advanced Image Technology 2006)
- SCRAMBLING OF MPEG VIDEO SUITABLE FOR IMAGE SEARCH (Image Processing and Coding)(International Workshop On Advanced Image Technology (IWAIT2004))
- A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation(Papers Selected from ITC-CSCC 2004)
- MORPHOLOGICAL IMAGE TAMPER DETECTING METHOD CONSIDERING ROBUSTNESS AGAINST COMPRESSION(INTERNATIONAL Workshop on Advanced Image Technology 2008)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION(International Workshop on Advanced Image Technology 2007)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION
- Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005)
- A Super-Resolution Method Based on the Discrete Cosine Transform (Special Section of Papers Selected from JTC-CSCC'95)
- A Representation Method of the Convergence Characteristic of the LMS Algorithm Using Tap-Input Vectors
- Parallel Processing Techniques for Multidimensional Sampling Lattice Alteration Based on Overlap-Add and Overlap-Save Methods
- An LS Based New Gradient Type Adaptive Algorithm : Least Squares Gradient (Special Section of Papers Selected from the 8th Digital Signal Processing Symymposium)
- A New Factorization Technique for the Generalized Linear-Phase LOT and Its Fast Implementation (Special Section on Digital Signal Processing)
- An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection
- A Generation Method of Amplitude-Only Images with Low Intensity Ranges
- An efficient access control method for composite multimedia content
- A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion