Image Authentication Based on DCT with Recovery Capability

نویسندگان

  • JOSE ANTONIO MENDOZA NORIEGA
  • BRIAN M. KURKOSKI
  • MARIKO NAKANO MIYATAKE
  • HECTOR PEREZ MEANA
چکیده

In this paper an image authentication algorithm is proposed where the modified areas in an image are detected, besides an aproximation of the original image, called digest image Cdig, is recovered (recovery capability). Two different watermarks are used. One semi-fragile watermark w1 is used for authentication phase. The digest image Cdig is compressed using an arithmetic code, then redundancy is added by applying BCH error correcting code (ECC) resulting wdig. Finally both watermarks are embedded in the integer wavelet transform (IWT) domain. The proposed scheme is evaluated from different points of view: watermark imperceptibly, payload, accuracy detection of tamper area and robustness against some non intentional attacks. Experimental results show the system detects accurately where the image has been modified and the recovered digest image has a good quality. The proposed system is robust to noise insertion. Key–Words: Semi-fragile watermark, recovery capability, DCT, IWT, ECC.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

A DCT-based Recoverable Image Authentication Technique

In this paper, a scheme that has tamper proofing and recovery abilities is proposed. With the specific DCT frequency coefficients taken as the characteristic values, which are embedded into the least significant bits of the image pixels, it is used to provide proof of image integrity. If the image is tampered, the embedded characteristic values that are affected will be changed accordingly and ...

متن کامل

Accurate Fruits Fault Detection in Agricultural Goods using an Efficient Algorithm

The main purpose of this paper was to introduce an efficient algorithm for fault identification in fruits images. First, input image was de-noised using the combination of Block Matching and 3D filtering (BM3D) and Principle Component Analysis (PCA) model. Afterward, in order to reduce the size of images and increase the execution speed, refined Discrete Cosine Transform (DCT) algorithm was uti...

متن کامل

A Flexible Scheme of Self Recovery for Digital Image Protection

This paper proposes a self-embedding method with flexible restoration capability. We present a method of encoding DCT coefficients of each block into reference bits for self-embedding. In order to improve the restoration capability, we classify the selected coefficients into three types, and assign different bits for each type to generate reference bits. The generated reference bits are embedde...

متن کامل

Image Authentication and Recovery through Optimal Selection of Block Types

In this letter, we present an authentication and recovery scheme to protect images. The image blocks are DCT transformed and then encoded with different patterns. An optimal selection is adopted to find the best pattern for each block which results in better image quality. Both the recovery and check data are embedded for data protection. The experimental results demonstrate that our method is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010