• 沒有找到結果。

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation

N/A
N/A
Protected

Academic year: 2022

Share "A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation

作者: Lee, C. F.;Chen, K. N.;Chang, C. C.;Tsai, M. C.

關鍵詞: authentication;temper detction;VQ attack 日期: 2009-09

上傳時間: 2009-12-17T06:57:16Z 出版者: Asia University

摘要: A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The

authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.

參考文獻

相關文件

Upon reception of a valid write command (CMD24 or CMD25 in the SD Memory Card protocol), the card will respond with a response token and will wait for a data block to be sent from

Reading Task 6: Genre Structure and Language Features. • Now let’s look at how language features (e.g. sentence patterns) are connected to the structure

 Promote project learning, mathematical modeling, and problem-based learning to strengthen the ability to integrate and apply knowledge and skills, and make. calculated

Now, nearly all of the current flows through wire S since it has a much lower resistance than the light bulb. The light bulb does not glow because the current flowing through it

Then they work in groups of four to design a questionnaire on diets and eating habits based on the information they have collected from the internet and in Part A, and with

This kind of algorithm has also been a powerful tool for solving many other optimization problems, including symmetric cone complementarity problems [15, 16, 20–22], symmetric

contributions to the nearby pixels and writes the final floating point image to a file on disk the final floating-point image to a file on disk. • Tone mapping operations can be

2 I understand that the Education Bureau (EDB) will take such measures as they consider necessary and appropriate to verify the information provided in and/or in relation to this