Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Lossless Data Hiding in the Spatial Domain for High Quality Images
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
A New Approach in Reversible Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
An efficient prediction-and-shifting embedding technique for high quality reversible data hiding
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Hi-index | 0.00 |
This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.