A DCT-Based Image Authentication Approach with Attack Recovery

碩士 === 玄奘大學 === 資訊科學學系碩士班 === 95 === Image authentication techniques verify the integrity of an image from malicious manipulations. Most image authentication methods treat all types of manipulation equally. However, with the increasing demand of JPEG images, a need arise in image authentication whic...

Full description

Bibliographic Details
Main Authors: Hsuan-An Ke, 柯炫安
Other Authors: Chien-Chang Chen
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/60485867621787108372
id ndltd-TW-095HCU08396013
record_format oai_dc
spelling ndltd-TW-095HCU083960132016-05-16T04:09:39Z http://ndltd.ncl.edu.tw/handle/60485867621787108372 A DCT-Based Image Authentication Approach with Attack Recovery 具還原能力之容錯型影像驗證技術 Hsuan-An Ke 柯炫安 碩士 玄奘大學 資訊科學學系碩士班 95 Image authentication techniques verify the integrity of an image from malicious manipulations. Most image authentication methods treat all types of manipulation equally. However, with the increasing demand of JPEG images, a need arise in image authentication which could distinguish some acceptable manipulations like JPEG compression from malicious ones. In this thesis, we propose a DCT-based image authentication method which can detect authority and recover the malicious modification. The image feature codes are calculated from important DCT coefficients and then embedded into other DCT middle domain by our proposed quantization properties. The embedded information is tolerant to JPEG compression with quantization step less than two times of the pre-determined quantization step but is sensitive to other malicious attacks. The attacked blocks are indicated when verifying a watermarked image. Experimental results show that the attacked blocks can be recovered efficiently by the proposed approach. Chien-Chang Chen 陳建彰 2007 學位論文 ; thesis 47 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 玄奘大學 === 資訊科學學系碩士班 === 95 === Image authentication techniques verify the integrity of an image from malicious manipulations. Most image authentication methods treat all types of manipulation equally. However, with the increasing demand of JPEG images, a need arise in image authentication which could distinguish some acceptable manipulations like JPEG compression from malicious ones. In this thesis, we propose a DCT-based image authentication method which can detect authority and recover the malicious modification. The image feature codes are calculated from important DCT coefficients and then embedded into other DCT middle domain by our proposed quantization properties. The embedded information is tolerant to JPEG compression with quantization step less than two times of the pre-determined quantization step but is sensitive to other malicious attacks. The attacked blocks are indicated when verifying a watermarked image. Experimental results show that the attacked blocks can be recovered efficiently by the proposed approach.
author2 Chien-Chang Chen
author_facet Chien-Chang Chen
Hsuan-An Ke
柯炫安
author Hsuan-An Ke
柯炫安
spellingShingle Hsuan-An Ke
柯炫安
A DCT-Based Image Authentication Approach with Attack Recovery
author_sort Hsuan-An Ke
title A DCT-Based Image Authentication Approach with Attack Recovery
title_short A DCT-Based Image Authentication Approach with Attack Recovery
title_full A DCT-Based Image Authentication Approach with Attack Recovery
title_fullStr A DCT-Based Image Authentication Approach with Attack Recovery
title_full_unstemmed A DCT-Based Image Authentication Approach with Attack Recovery
title_sort dct-based image authentication approach with attack recovery
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/60485867621787108372
work_keys_str_mv AT hsuananke adctbasedimageauthenticationapproachwithattackrecovery
AT kēxuànān adctbasedimageauthenticationapproachwithattackrecovery
AT hsuananke jùháiyuánnénglìzhīróngcuòxíngyǐngxiàngyànzhèngjìshù
AT kēxuànān jùháiyuánnénglìzhīróngcuòxíngyǐngxiàngyànzhèngjìshù
AT hsuananke dctbasedimageauthenticationapproachwithattackrecovery
AT kēxuànān dctbasedimageauthenticationapproachwithattackrecovery
_version_ 1718267975283245056