An efficient reversible authentication scheme for demosaiced images with improved detectability
Autor: | Xiaoyu Zhou, Tung-Shou Chen, Wien Hong, Chun-Hung Hsieh |
---|---|
Rok vydání: | 2020 |
Předmět: |
Authentication
Pixel Image quality business.industry Computer science Hash function ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION 020206 networking & telecommunications 02 engineering and technology Image (mathematics) Set (abstract data type) Distortion Signal Processing 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Computer vision Computer Vision and Pattern Recognition Artificial intelligence Electrical and Electronic Engineering business Software Reference table |
Zdroj: | Signal Processing: Image Communication. 80:115666 |
ISSN: | 0923-5965 |
DOI: | 10.1016/j.image.2019.115666 |
Popis: | The existing probability based reversible authentication schemes for demosaiced images embed authentication codes into rebuilt components of image pixels. The original demosaiced image can be totally recovered if the marked image is unaltered. Although these schemes offer the goal of pixel-wise tamper detection, the generated authentication codes are irrelevant to the image pixels, causing some undetectable intentional alterations. The proposed method pre-processes the rebuilt components of demosaiced images and hashes them to generate authentication codes. With the guide of a randomly-generated reference table, authentication codes are embedded into the rebuilt components of demosaiced images. Since the distortions of image pixels are sensitive to the embedded authentication codes, the proposed method further alters the pre-processed pixels to generate a set of authentication codes. One of the authentication codes that minimizes the distortion is embedded to generate marked demosaiced images. The results show that the proposed method offers a better image quality than prior state-of-the-art works, and is capable of detecting a variety of tampering. |
Databáze: | OpenAIRE |
Externí odkaz: |