Chaotic Maps Based Scheme for Image Authentication
Abstract
Keywords
Full Text:
PDFReferences
Phen Lan Lin, Chung-Kai Hsieh, Po-Whei Huang, (2005) “A hierarchical digital watermarking method for image tamper detection and recovery”, Pattern Recognition 38 2519 – 2529.
Tien-You Lee, Shinfeng D. Lin, (2008) “Dual watermark for image tamper detection and recovery”, Pattern Recognition 41 3497 – 3506.
Shui-Hua Han, Chao-Hsien Chu, (2010) “Content-based image authentication: current status, issues, and challenges”, Int. J. Inf. Secur. 9:19–32.
Chan, C.S., Chang, C.C., 2007. “An efficient image authentication method based on Hamming code”, Pattern Recognition 40 (February (2)), 681–690.
Chi-Shiang Chan, (2011) “An image authentication method by applying Hamming code on rearranged bits”, Pattern Recognition Letters 32 1679–1690.
Hong-Jie He, Jia-Shu Zhang, and Heng-Ming Tai, (2009) “Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization”, IH 2009, LNCS 5806, pp. 132–145.
H. He, et al., Adjacent-block based statistical detection method for self-embedding watermarking techniques, Signal Process. 89 (8) (2009) 1557–1566.
Hong-Jie He, Jia-Shu Zhang, and Heng-Ming Tai, Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization, IH 2009, LNCS 5806, pp. 132–145, 2009.
Bin Li etc, A Survey on Image Steganography and Steganalysis, Journal of Information Hiding and Multimedia Signal Processing(2011) Volume 2, Number 2, April 2011.
D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
Adil Haouzia & Rita Noumeir, Methods for image authentication: a surveyMultimed Tools Appl (2008) 39:1–46.
Xiaojun Qi , Xing Xin, A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, J. Vis. Commun. Image R. 30 (2015) 312–327.
]S. Bravo-Solorio L. Gan, A.K. Nandi M.F. Aburdene, Secure private fragile watermarking scheme with improved tampering localisation accuracy, IET Inf. Secur., 2010, Vol. 4, Iss. 3, pp. 137–148.
HE H., ZHANG J., TAI H.M.: ‘A wavelet-based fragile watermarking scheme for secure image authentication’. Proc. IWDW – Int. Workshop on Digital Watermarking,NCS, 2006, vol. 4283, pp. 422–432.
Chin-Chen Chang , Yi-Hui Chen , Hsin-Chi Wang,” Meaningful secret sharing technique with authentication and remedy abilities”, Information Sciences 181 (2011) 3073–3084.
D.C. Lou, H.K. Tso, J.L. Liu, A copyright protection scheme for digital images using visual cryptography technique, Computer Standards and Interfaces 29 (1) (2007) 125–131.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.