English  |  正體中文  |  简体中文  |  Items with full text/Total items : 51510/86705 (59%)
Visitors : 8259333      Online Users : 78
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/59925

    Title: Image Authentication under DCT Domain with Attack Recovery
    Authors: Chen, Chien Chang;Ke, Husan An
    Contributors: 淡江大學資訊工程學系
    Keywords: JPEG compression;Image authentication;DCT quantization;Image recovery
    Date: 2010-03
    Issue Date: 2013-06-07 10:46:12 (UTC+8)
    Publisher: Kumamoto: ICIC International
    Abstract: Image authentication schemes verify the integrity of an image against malicious manipulations. Most image authentication methods treat all manipulations as attacks. However, with the increasing demand for protecting JPEG images, image authentication methods that distinguish JPEG compression from malicious attacks are increasingly needed. This work presents a DCT-based image authentication approach with attack recovery, which recovers the attacked blocks. Two quantization properties, DQP and FQP, are presented to embed authentication features. The embedded feature is tolerant to JPEG compression with a quantization step of less than twice the pre-determined quantization step, but is sensitive to other malicious attacks. The attacked blocks are indicated after verifying a protected image, and the embedded recovery features are then
    extracted to recover these attacked blocks. Moreover, in case of the damage of recovery feature, an edge-based interpolation recovery approach (EIRA) is proposed to improve recovery results. Experimental results show that the proposed approach efficiently detects and recovers attacked blocks.
    Relation: International Journal of Innovative Computing, Information and Control 6(3A), pp.885-896
    Appears in Collections:[資訊工程學系暨研究所] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback