Watermarking-Based Method for Image Authentication and Image Recovery
スポンサーリンク
概要
- 論文の詳細を見る
In this paper an image authentication algorithm is proposed where the modified areas in an image are detected, in addition an approximation of the original image, called digest image C_<dig>, is recovered. Two different watermarks are used. One semi-fragile watermark wi is used for authentication phase. The other, digest image C_<dig> is compressed using an arithmetic code, then redundancy is added by applying BCH error correcting code (ECC) resulting W_<dig>. Finally, both watermarks are embedded in the integer wavelet transform (IWT) domain. The proposed scheme is evaluated from different points of view: watermark imperceptibly, payload, accuracy detection of tamper area and robustness against intentional attacks. Experimental results show the system detects accurately where the image has been modified and the recovered digest image has a good quality.
- 2010-09-03
著者
-
Mendoza Noriega
Sepi Esime Culhuacan National Polytechnic Institute
-
Kurkoski Brian
Dept. Of Information And Communication Engineering University Of Electro-communications
-
Kurkoski Brian
Dept. Of Inf. And Communications Engineering University Of Electro-communications
-
Nakano Miyatake
Sepi Esime Culhuacan National Polytechnic Institute
-
MENDOZA NORIEGA
SEPI, ESIME Culhuacan, National Polytechnic Institute
-
NAKANO MIYATAKE
SEPI, ESIME Culhuacan, National Polytechnic Institute
関連論文
- Watermarking-Based Method for Image Authentication and Image Recovery
- Robust image hashing against geometric attacks using image normalization and SVD decomposition
- Robust image hashing against geometric attacks using image normalization and SVD decomposition (ワイドバンドシステム・情報通信基礎サブソサイエティ合同研究会)
- Robust image hashing against geometric attacks using image normalization and SVD decomposition (情報セキュリティ・情報通信基礎サブソサイエティ合同研究会)
- Noise Thresholds for GF(q) LDPC Codes Using Reduced-Complexity Decoding
- Generalization of "Algorithm E" for Decoding LDPC Codes Over GF(q)(HISC2006)
- Turbo Decoding Based on the Lookup-Table Algorithm
- Tracing Illegal Users of Video Content Using Watermarking and Fingerprinting
- One-bit LDPC message passing decoding algorithm based on maximization of mutual information (情報理論)