Image Tamper Detection and Recovery based on Dilation and Chaotic Mixing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Tamper Detection and Recovery based on Dilation and Chaotic Mixing

In this paper, we propose an efficient method for image tamper detection and recovery. We separate the image into several blocks, and share a block information to two other blocks. It means, there have two copies of one block information for each non-overlapping block. In implementing, we improve Lee's algorithm of watermark embedding, especially when the tampered area is a rounded region or a ...

متن کامل

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy

Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir’s s...

متن کامل

Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code

Quick response (QR) code is the prevalent trademark for a type of matrix barcode symbol. That code is always scanned to efficiently acquire data, especially for mobile device users. It involves the capabilities of data storage, reliable readability and strong error correction. This paper utilizes these properties of a QR code to propose an image tamper detection and recovery scheme for grayscal...

متن کامل

Nonintrusive Image Tamper Detection Based on Fuzzy Fusion

In this paper, we propose a novel fuzzy fusion of image residue features for detecting tampering or forgery in video sequences. We suggest use of feature selection techniques in conjunction with fuzzy fusion approach to enhance the robustness of tamper detection methods. We examine different feature selection techniques, the independent component analysis (ICA), and the canonical correlation an...

متن کامل

Image Watermarking for Tamper Detection

We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science and Information Technology

سال: 2015

ISSN: 2331-6063,2331-6071

DOI: 10.13189/csit.2015.030406