A dual-tamper-detection method for digital image authentication and content self-recovery

Author(s):  
Tong Liu ◽  
Xiaochen Yuan
Author(s):  
Chen Liu ◽  
Yude Dong ◽  
Yanli Wei ◽  
Jiangtao Wang ◽  
Hongling Li

The internal structure analysis of radial tires is of great significance to improve vehicle safety and during tire research. In order to perform the digital analysis and detection of the internal composition in radial tire cross-sections, a detection method based on digital image processing was proposed. The research was carried out as follows: (a) the distribution detection and parametric analysis of the bead wire, steel belt, and carcass in the tire section were performed by means of digital image processing, connected domain extraction, and Hough transform; (b) using the angle of location distribution and area relationship, the detection data were optimized through coordinate and quantity relationship constraints; (c) a detection system for tire cross-section components was designed using the MATLAB platform. Our experimental results showed that this method displayed a good detection performance, and important practical significance for the research and manufacture of tires.


2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2011 ◽  
Vol 2 (2) ◽  
pp. 55-78
Author(s):  
Yue Li ◽  
Chia-Hung Wei

Author(s):  
Akira Yamamoto ◽  
Shigeya Suzuki ◽  
Hisakazu Hada ◽  
Jin Mitsugi ◽  
Fumio Teraoka ◽  
...  

2014 ◽  
Vol 926-930 ◽  
pp. 3038-3041
Author(s):  
Cheng Wang

In this paper, we introduce a new method for ellipse detection. For any object has closed curve in a digital image, it is easy to calculate the centroid of the object. We assume the object is an ellipse, and then by rotating, scaling this object, it can be transformed to a circle. So, ellipse detection problem becomes circle detection problem. Compared with other detection methods, our method only need process border points of the object, hence has higher detection speed.


Sign in / Sign up

Export Citation Format

Share Document