Authentication and cross-recovery for multiple images
نویسندگان
چکیده
This work presents an authentication and cross-recovery scheme to protect a group of n JPEG images. Given n images, the images are scaled down and then encoded using JPEG to create n recovery data. Based on a pre-determined threshold t, 2 ≤ t < n, the n recovery data are shared to create n shadows. Next, n authentication data are generated to identify malicious attacks on the system. Additionally, the n shadows and the n authentication data are embedded in the n JPEG codes of the n original images to form n JPEG stego codes, which can be stored in a distributed storage system. Moreover, in the daily maintenance of the storage system, the authentication data concealed inside these n JPEG stego codes are used to verify which ones have been attacked. If some (up to n − t) of the n JPEG stego codes are corrupted, the corrupted JPEG images can be recovered approximately using any t survived JPEG stego codes. Experimental results demonstrate the effectiveness of the proposed method. Comparisons with other image recovery methods are also included.
منابع مشابه
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملSpeckle Noise Reduction for the Enhancement of Retinal Layers in Optical Coherence Tomography Images
Introduction One of the most important pre-processing steps in optical coherence tomography (OCT) is reducing speckle noise, resulting from multiple scattering of tissues, which degrades the quality of OCT images. Materials and Methods The present study focused on speckle noise reduction and edge detection techniques. Statistical filters with different masks and noise variances were applied on ...
متن کاملImage Authentication and Recovery through Optimal Selection of Block Types
In this letter, we present an authentication and recovery scheme to protect images. The image blocks are DCT transformed and then encoded with different patterns. An optimal selection is adopted to find the best pattern for each block which results in better image quality. Both the recovery and check data are embedded for data protection. The experimental results demonstrate that our method is ...
متن کاملAn Authentication and Recovery method for color Images
With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Electronic Imaging
دوره 17 شماره
صفحات -
تاریخ انتشار 2008