期刊文献+

An Image Authentication Method by Grouping Most Significant Bits

An Image Authentication Method by Grouping Most Significant Bits
下载PDF
导出
摘要 In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered pixel can be determined according to its parity check bits. With the help of the most-significant bit of the pixel, the pixel can be recovered by selecting two possible (7, 4) Hamming code words. However, if the distance between two Hamming code words is within a certain range, incorrect selection may occur. Chan's method added one additional bit to indicate the correct one. It is trivial that this may degrade the quality of the authenticated image. In this paper, we group four most-significant bits into different groups to form a mapping codebook and the mapping codebook is used to produce authentication data instead of the (7, 4) Hamming code book. The experimental results show that the proposed method has a greater ability to recover tampered areas. In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered pixel can be determined according to its parity check bits. With the help of the most-significant bit of the pixel, the pixel can be recovered by selecting two possible (7, 4) Hamming code words. However, if the distance between two Hamming code words is within a certain range, incorrect selection may occur. Chan's method added one additional bit to indicate the correct one. It is trivial that this may degrade the quality of the authenticated image. In this paper, we group four most-significant bits into different groups to form a mapping codebook and the mapping codebook is used to produce authentication data instead of the (7, 4) Hamming code book. The experimental results show that the proposed method has a greater ability to recover tampered areas.
出处 《Journal of Electronic Science and Technology》 CAS 2013年第1期33-37,共5页 电子科技学刊(英文版)
基金 supported by the Asia University,Taiwan under Grant No.100-ASIA-38
关键词 Image authentication information hiding tamper proofing. Image authentication,information hiding,tamper proofing.
  • 相关文献

参考文献9

  • 1C.-S. Chan and C.-C. Chang, "An efficient image authentication method based on hamming code," Pattern Recognition, vol. 40, no. 2, pp. 681-690, 2007.
  • 2T.-Y. Lee and S.-D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.
  • 3S.-S. Wang and S.-L. Tsai, "Automatic image authentication and recovery using fractal code embedding and image in painting," Pattern Recognition, vol. 41, no. 2, pp. 701-712, 2008.
  • 4C.-W. Yang and J.-J. Shen, "Recover the tampered image based on VQ indexing," Signal Processing, vol. 90, no. 2, pp 331-343, 2010.
  • 5R. W. Hamming, "Error detecting and error correcting codes," The Bell System Technical Journal, vol. 26, no. 2, pp 147-160. 1950.
  • 6C.-S. Chan, "An image authentication method by applying hamming code on rearranged bits," Pattern Recognition Letter, vol. 32, no. 14, pp. 1679-1690, 2011.
  • 7C.-C. Thien and J.-C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, 2003.
  • 8G. Voyatzis and I. Pitas, "Chaotic mixing of digital images and applications to watermarking," in Proe. of European Conf. on Multimedia Applications, Louvain-la-Neuve, Belgium, 1996, pp. 687-695.
  • 9J. Serra, Image Analysis and Mathematical Morphology, New York: Academic Press, 1982.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部