2017
DOI: 10.1186/s13640-017-0163-8
|View full text |Cite
|
Sign up to set email alerts
|

Quantization-based image authentication scheme using QR error correction

Abstract: Image authentication, which is provided with capabilities of tamper detection and data recovery, is an efficient way to protect the contents of digital images. Vector quantization (VQ) is a data compression method. A VQcompressed code is not only a significant image authentication feature but also applicable in restoring possibly damaged pixels. However, if an image is tampered with, the necessary recovery information disappears. To solve this problem, this paper proposes a quantization-based image authenticat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Since the computation cost of AMBTC is even lower than BTC, it has been widely applied in diverse areas, such as remote sensing and portable devices with limited power sources. Therefore, like the authentication methods for VQ and JPEG compressed images [3][4][5][6], the investigation of authentication for AMBTC compressed codes has received much attention, and subsequently, a number of authentication methods [7][8][9][10][11][12][13] in this field have been proposed in the past few years. These methods adopt spatial-domain data embedding techniques [14][15][16][17][18][19] or AMBTC-based compressed domain data hiding methods [20][21][22][23] to embed authentication codes (ACs) for the purpose of authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Since the computation cost of AMBTC is even lower than BTC, it has been widely applied in diverse areas, such as remote sensing and portable devices with limited power sources. Therefore, like the authentication methods for VQ and JPEG compressed images [3][4][5][6], the investigation of authentication for AMBTC compressed codes has received much attention, and subsequently, a number of authentication methods [7][8][9][10][11][12][13] in this field have been proposed in the past few years. These methods adopt spatial-domain data embedding techniques [14][15][16][17][18][19] or AMBTC-based compressed domain data hiding methods [20][21][22][23] to embed authentication codes (ACs) for the purpose of authentication.…”
Section: Introductionmentioning
confidence: 99%
“…But reference data can be destroyed by some image processing operations, such as filtering, compressing and additional noise interference, so content recovery is disabled. A different method was proposed recently by Wu [49] where an image authentication scheme was proposed to exploit QR codes to protect the integrity of significant VQ authentication data. This method only focuses on the authentication process while the recovery process requires repetition until all blocks undergoing changes are reconstructed.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…Grouping is different in Table 2 using the frequency domain. Method [4,41,49,54] take advantage of robust watermarking for generating recovery bits inserted into the LL sub band on the DWT. The main drawback of this method is that computing is quite high and the watermark insertion capacity is low.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…In the second step the unit circle within the stable edge profile is notified. [16](Wen-Chuan Wu, 2017) have proposed a digital image watermarking technique known as quantization-based image authentication scheme using QR error correction. The proposed scheme is mainly based upon quantization-based image authentication scheme using twodimensional barcodes mainly to protect important features.…”
Section: Fig1generic Block Diagram Of Image Watermarkingmentioning
confidence: 99%