Authentication and cross-recovery for multiple images

نویسندگان

  • Yu-Jie Chang
  • Sian-Jheng Lin
  • Ja-Chen Lin
چکیده

This work presents an authentication and cross-recovery scheme to protect a group of n JPEG images. Given n images, the images are scaled down and then encoded using JPEG to create n recovery data. Based on a pre-determined threshold t, 2 ≤ t < n, the n recovery data are shared to create n shadows. Next, n authentication data are generated to identify malicious attacks on the system. Additionally, the n shadows and the n authentication data are embedded in the n JPEG codes of the n original images to form n JPEG stego codes, which can be stored in a distributed storage system. Moreover, in the daily maintenance of the storage system, the authentication data concealed inside these n JPEG stego codes are used to verify which ones have been attacked. If some (up to n − t) of the n JPEG stego codes are corrupted, the corrupted JPEG images can be recovered approximately using any t survived JPEG stego codes. Experimental results demonstrate the effectiveness of the proposed method. Comparisons with other image recovery methods are also included.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Speckle Noise Reduction for the Enhancement of Retinal Layers in Optical Coherence Tomography Images

Introduction One of the most important pre-processing steps in optical coherence tomography (OCT) is reducing speckle noise, resulting from multiple scattering of tissues, which degrades the quality of OCT images. Materials and Methods The present study focused on speckle noise reduction and edge detection techniques. Statistical filters with different masks and noise variances were applied on ...

متن کامل

Image Authentication and Recovery through Optimal Selection of Block Types

In this letter, we present an authentication and recovery scheme to protect images. The image blocks are DCT transformed and then encoded with different patterns. An optimal selection is adopted to find the best pattern for each block which results in better image quality. Both the recovery and check data are embedded for data protection. The experimental results demonstrate that our method is ...

متن کامل

An Authentication and Recovery method for color Images

With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Electronic Imaging

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2008