tamper recovery
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Rui Zhang ◽  
Di Xiao ◽  
Yanting Chang

This paper proposes a novel tamper detection, localization, and recovery scheme for encrypted images with Discrete Wavelet Transformation (DWT) and Compressive Sensing (CS). The original image is first transformed into DWT domain and divided into important part, that is, low-frequency part, and unimportant part, that is, high-frequency part. For low-frequency part contains the main information of image, traditional chaotic encryption is employed. Then, high-frequency part is encrypted with CS to vacate space for watermark. The scheme takes the processed original image content as watermark, from which the characteristic digest values are generated. Comparing with the existing image authentication algorithms, the proposed scheme can realize not only tamper detection and localization but also tamper recovery. Moreover, tamper recovery is based on block division and the recovery accuracy varies with the contents that are possibly tampered. If either the watermark or low-frequency part is tampered, the recovery accuracy is 100%. The experimental results show that the scheme can not only distinguish the type of tamper and find the tampered blocks but also recover the main information of the original image. With great robustness and security, the scheme can adequately meet the need of secure image transmission under unreliable conditions.


2016 ◽  
Vol 76 (10) ◽  
pp. 12481-12504 ◽  
Author(s):  
Z. H. Liu ◽  
D. Luo ◽  
J. W. Huang ◽  
J. Wang ◽  
C. D. Qi

2013 ◽  
Vol 432 ◽  
pp. 533-537
Author(s):  
Chuan Mu Li

A block-wise and content-based image authentication scheme with location and recovery is presented. In this scheme, the watermark of each block is an encrypted form of its content-feature, which is embedded in another block which selected by an ergodic matrix of a chaotic sequence. The randomicity of selected block can robust the VQ attack. The encryption further strengthens the security. That all security parameters are user dependent and can be computed at both ends individually based on Diffie-Hellman key exchange method makes the scheme not only robust against collage attack but also truly oblivious. The experiments demonstrate that the proposed scheme can detect and localize any tampering of size 8x8 pixels and above and can recover a 40% damaged image to an intelligible one.


2013 ◽  
Vol 13 (02) ◽  
pp. 1340002 ◽  
Author(s):  
DURGESH SINGH ◽  
SHIVENDRA SHIVANI ◽  
SUNEETA AGARWAL

This paper suggests an efficient fragile watermarking scheme for image content authentication along with altered region restoration capability. In this scheme, image is divided into nonoverlapping blocks of size 2 × 2 and for each block, eight bits for image content recovery data and four bits for authentication data from five most significant bits (MSBs) of each pixel, are generated. These 12 bits are embedded into the least significant bits (LSBs) of the pixels which are placed in its corresponding mapping block. At the receiver end by comparing the recalculated and extracted authentication data, the tampered blocks can easily be identified and using recovery data, one can easily restore the tampered block. Results of experiments demonstrate that the proposed scheme is effective enough for alteration detection as well as tamper recovery of the image.


Sign in / Sign up

Export Citation Format

Share Document