2010
DOI: 10.1117/1.3500799
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and recovery of an image by sharing and lattice-embedding

Abstract: Based on sharing and lattice-embedding techniques, we present an authentication-recovery method for an image. The recovery data are shared among many shadows, then lattice-embedding is utilized to embed each shadow in the discrete cosine transform domain of an 8×8 block. The proposed method can resist certain content-preserving operations such as JPEG compression, Gaussian noise, and brightness adjustment, up to a tolerance level controlled by a quantization parameter value. The method can also resist certain … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Besides detecting whether it has been tampered by common signal processing operations, the Lin et al [22] scheme adds the recovery functionality of the affected image regions. To achieve these goals, they make use of several tools chosen to meet the requirements of watermarking schemes: lattice-based embedding into the DCT coefficients to lower the impact of the hidden data and a secret sharing approach to reconstruct the watermark with recovery capability.…”
Section: Image Authenticationmentioning
confidence: 99%
“…Besides detecting whether it has been tampered by common signal processing operations, the Lin et al [22] scheme adds the recovery functionality of the affected image regions. To achieve these goals, they make use of several tools chosen to meet the requirements of watermarking schemes: lattice-based embedding into the DCT coefficients to lower the impact of the hidden data and a secret sharing approach to reconstruct the watermark with recovery capability.…”
Section: Image Authenticationmentioning
confidence: 99%
“…How to balance the requirements for both higher capacity and more robustness is an open research question. Lin and Lin [12] introduced a semifragile watermarking scheme with self-restoration ability based on (t, n) secret sharing and Reed-Solomon (RS) code. The restoration watermark is generated from the four lowest DCT coefficients and encoded as an RS code.…”
Section: Introductionmentioning
confidence: 99%
“…Tong et al [27] also use a watermarking algorithm to detect and localize tampered areas. Lin et al [28] present an authentication and recovery method for tampered images.…”
mentioning
confidence: 99%