Recoverable tamper proofing technique for image authentication using irregular sampling coding

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Digital imagery is an important medium in information processing in the digital era. However, a major problem in information processing is that digital images can be forged easily. If this problem cannot be alleviated, the popularization of digital imagery will be decreased. Hence, in recent years, a few tamper proofing or image authentication techniques have been proposed to deal with this problem. In this paper, a new recoverable image authentication technique is proposed. Our method employs a very low bit-rated compression method called irregular sampling coding to compress the image. The compressed code is then randomly embedded into the original image using the digital watermarking technique. Since the image is highly compressed, it can be used to detect and recover the tampered-with information. Experimental results show that the proposed tamper proofing technique can effectively detect and recover the modified image. In addition, the experiments also show that the proposed technique is robust. Even though the image is 90%cropped or is highly compressed using JPEG, the quality of the recovered image is acceptable. The proposed method is therefore an effective, robust and recoverable tamper proofing technique. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Hung, K. L., & Chang, C. C. (2007). Recoverable tamper proofing technique for image authentication using irregular sampling coding. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4610 LNCS, pp. 333–343). Springer Verlag. https://doi.org/10.1007/978-3-540-73547-2_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free