MORPHOLOGICAL IMAGE TAMPER DETECTING METHOD CONSIDERING ROBUSTNESS AGAINST COMPRESSION(INTERNATIONAL Workshop on Advanced Image Technology 2008)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes mathematical morphology-based tamper detecting methods that consider robustness against compression. Some operation of mathematical morphology have an algebraic property called idempotence that once an image is processed, it will never be changed by further operation with the same structuring element. The conventional morphology-based tamper detecting method judges a suspected image to have been tampered if idempotence is disrupted between the suspected image and its morphologically operated image. This conventional method, however, has difficulty in distinguishing between malicious tampering and legal compression. This paper shows that idempontence holds for compressed images under certain conditions. This property enables the proposed method to distinguish compression from tampering.
- 社団法人電子情報通信学会の論文
- 2007-12-31
著者
-
Kiya Hitoshi
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
Kiya Hitoshi
Department Of Information And Communication Systems Engineering Faculty Of System Design Tokyo Metro
-
Kiya Hitoshi
Tokyo Metropolitan Univ. Hachioji‐shi Jpn
-
Fujiyoshi Masaaki
Department Of Electrical Engineering Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Graduate School Of System Design Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
Kiya Hitoshi
Dept. Of Electrical And Information Eng. Tokyo Metro. Univ:dept. Of Information And Communications S
-
KIHARA Mirei
Dept. of Information and Communication Systems Engineering, Tokyo Metropolitan University
-
Kihara Mirei
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
KIYA Hitoshi
Dept. Inf. & Comm. Systems, Tokyo Metropolitan University
-
FUJIYOSHI Masaaki
Dept. Inf. & Comm. Systems, Tokyo Metropolitan University
関連論文
- Parallel Processing of Distributed Video Coding to Reduce Decoding Time
- Layered Low-Density Generator Matrix Codes for Super High Definition Scalable Video Coding System
- SCALABLE SCRAMBLING FOR MPEG VIDEO(International Workshop on Advanced Image Technology 2005)
- Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP(Digital Signal Processing)
- QOS ESTIMATION BASED ON PSNR FOR MOTION JPEG2000 VIDEO IN LOSSY PACKET NETWORKS(International Workshop on Advanced Image Technology 2007)
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks(音響信号処理/一般)
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks
- Encryption of Composite Multimedia Contents for Access Control(Image,Multimedia and Mobile Signal Processing)
- A Reversible Image Authentication Method without Memorization of Hiding Parameters
- A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION(International Workshop on Advanced Image Technology 2009)
- An Efficient Reversible Image Authentication Method
- A-4-2 Applying Cipher to the Reversible Image Authentication
- Lossless Data Hiding in the Spatial Domain for High Quality Images(Selected Papers from the 19th Workshop on Circuits and Systems in Karuizawa)
- DCT Sign-Based Similarity Measure for JPEG Image Retrieval(Image)
- Fast Image Identification Methods for JPEG Images with Different Compression Ratios(Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2005))
- FAST AND ROBUST IDENTIFICATION METHODS FOR JPEG-CODED IMAGES(International Workshop on Advanced Image Technology 2006)
- SCRAMBLING OF MPEG VIDEO SUITABLE FOR IMAGE SEARCH (Image Processing and Coding)(International Workshop On Advanced Image Technology (IWAIT2004))
- Extension of Image Transport Protocol Allowing Sever-Side Control of Request for Retransmission(Communication Theory and Systems)(Applications and Implementations of Digital Signal Processing)
- MODIFIED PHASE-ONLY CORRELATION USING THE SIGN OF DCT COEFFICIENTS WITH APPLICATION TO IMAGE MATCHING(International Workshop on Advanced Image Technology 2007)
- A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation(Papers Selected from ITC-CSCC 2004)
- MORPHOLOGICAL IMAGE TAMPER DETECTING METHOD CONSIDERING ROBUSTNESS AGAINST COMPRESSION(INTERNATIONAL Workshop on Advanced Image Technology 2008)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION(International Workshop on Advanced Image Technology 2007)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION
- Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005)
- A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems
- A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems
- A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems
- A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems