A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


Author(s):  
R. AARTHI ◽  
V. JAGANYA ◽  
S. POONKUNTRAN

This paper mainly aims at developing an authentication scheme for digital images. The LSB scheme is chosen base for our proposed work. Through literature survey it is found that conventional LSB scheme provides low embedding rat low distortion and is irreversible. Because of its irreversibility, the conventional LSB scheme cannot be used for critic applications where reversibility is mandatory. Through this literature survey, we learnt that this conventional LSB scheme us only one bit in every pixel for embedding. Our proposed scheme presents a modified LSB embedding strategy that satisfies th reversibility and improves the embedding rate by using two bits in every pixel for embedding.


2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2018 ◽  
pp. 2124-2138
Author(s):  
Priya Makarand Shelke ◽  
Rajesh Shardanand Prasad

Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
SeHee Jung ◽  
SungMin Yang ◽  
Eunseok Lee ◽  
YongHak Lee ◽  
Jisun Ko ◽  
...  

Particulate matters (PM) have become one of the important pollutants that deteriorate public health. Since PM is ubiquitous in the atmosphere, it is closely related to life quality in many different ways. Thus, a system to accurately monitor PM in diverse environments is imperative. Previous studies using digital images have relied on individual atmospheric images, not benefiting from both spatial and temporal effects of image sequences. This weakness led to undermining predictive power. To address this drawback, we propose a predictive model using the deep dehazing cascaded CNN and temporal priors. The temporal prior accommodates instantaneous visual moves and estimates PM concentration from residuals between the original and dehazed images. The present method also provides, as by-product, high-quality dehazed image sequences superior to the nontemporal methods. The improvements are supported by various experiments under a range of simulation scenarios and assessments using standard metrics.


2011 ◽  
Vol 34 (5) ◽  
pp. 1557-1565 ◽  
Author(s):  
Guangjie Liu ◽  
Junwen Wang ◽  
Shiguo Lian ◽  
Zhiquan Wang

Sign in / Sign up

Export Citation Format

Share Document