A remediable image authentication scheme based on feature extraction and clustered VQ

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present an image authentication scheme based on feature extraction and codeword clustering in this paper. The two-level detections can be performed progressively based on the requirements of the authenticator. In order to generate these two-level authentication codes, the quad-tree segmentation and clustered VQ techniques are used. Using the first-level authentication code, the malicious tampered areas can be detected and located. In the second-level, it not only provides a more rigid detection of tampered areas but also can further remedy them. According to the experimental results, our scheme can correctly detect the malicious tampering and tolerate some incidental modifications, and then successfully remedy the tampered area. In addition, the space cost of authentication code is quite little. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Chang, C. C., Tsou, C. C., & Chou, Y. C. (2007). A remediable image authentication scheme based on feature extraction and clustered VQ. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4810 LNCS, pp. 446–449). Springer Verlag. https://doi.org/10.1007/978-3-540-77255-2_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free