• 沒有找到結果。

An Efficient Image Authentication Method Based on Hamming Code

N/A
N/A
Protected

Academic year: 2022

Share "An Efficient Image Authentication Method Based on Hamming Code"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: An Efficient Image Authentication Method Based on Hamming Code 作者: Chan, C. S.;Chang, C. C.

關鍵詞: Image authentication;Tamper proofing;Hamming code;Torus automorphism 日期: 2006-05

上傳時間: 2009-12-17T06:58:22Z 出版者: Asia University

摘要: Image authentication has come through a history of several years. However, up to the present time, most mainstream image authentication schemes are still unable to detect burst bit errors. Moreover, the capability of recovering tampered pixels in detail (complex) areas has not been very satisfactory either. In this paper, we offer to combine the Hamming code technique, Torus automorphism and bit rotation technique to do tamper proofing. According to our experimental results, our new hybrid method can effectively eliminate burst bit errors, and our recovered pixels in detail areas can actually gain very high clarity. The results show that our scheme is quite a practical method, which is quite able to detect and recover tampered areas.

參考文獻

相關文件

(C) Some researchers say that if a person’s brain is right, she or he can easily have good musical skills.. (D) According to some researchers, the right brain helps us to improve

To complete the “plumbing” of associating our vertex data with variables in our shader programs, you need to tell WebGL where in our buffer object to find the vertex data, and

contributions to the nearby pixels and writes the final floating point image to a file on disk the final floating-point image to a file on disk. • Tone mapping operations can be

With λ selected by the universal rule, our stochastic volatility model (1)–(3) can be seen as a functional data generating process in the sense that it leads to an estimated

We also propose a Unified Code Management Schemes to eliminate code blocking completely and the reassignment cost will be reduced as far as possible based on CIDP.. Our schemes

(2) We emphasized that our method uses compressed video data to train and detect human behavior, while the proposed method of [19] Alireza Fathi and Greg Mori can only

The experimental results show that the developed light-on test methodology can effectively detect point defects (bright point, dark point, weak point), line defects (bright line,

Investigating the effect of learning method and motivation on learning performance in a business simulation system context: An experimental study. Four steps to