A Study on Digital Image Authentication and Recovery Using 2D QR Codes

碩士 === 真理大學 === 資訊工程學系碩士班 === 103 === Image authentication is an important technology to protect image content integrity. Most of these methods use self-embedding technique, which embeds particular authentication data into the image itself. The embedded result is named an authenticated image, which...

Full description

Bibliographic Details
Main Authors: LIN, Tzu-Wei, 林子瑋
Other Authors: Wu, Wen-Chuan
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/56871403842520088790
id ndltd-TW-103AU000392009
record_format oai_dc
spelling ndltd-TW-103AU0003920092016-09-25T04:04:58Z http://ndltd.ncl.edu.tw/handle/56871403842520088790 A Study on Digital Image Authentication and Recovery Using 2D QR Codes 結合二維條碼之影像驗證與回復機制之研究 LIN, Tzu-Wei 林子瑋 碩士 真理大學 資訊工程學系碩士班 103 Image authentication is an important technology to protect image content integrity. Most of these methods use self-embedding technique, which embeds particular authentication data into the image itself. The embedded result is named an authenticated image, which must have very good quality such that it cannot perceive any differences between two highly similar images with the naked eye. When that image was illegally modified during the transmission via the public network, an image authentication method is able to extract the hidden data to determine whether an image has been tampered with or not. Further, the content of tampered regions could be restored back to its initial state in order to reduce the probability of image retransmission and save network bandwidth. This thesis proposed three image authentication methods. The first method is to adopt the stable singular values as authentication data and then hide them randomly into image pixels. However, false tampering detection might occur when some areas were tampered in such a way that the authentication data of the others make changes. In order to prevent this defect, therefore, this thesis attempt to represent the authentication data into a quick response (QR) code in the second method. The main reason is that a QR code possesses the capability of strong tolerance and error correction. It allows a QR code to be read correctly even if the code is slightly dirty or damaged. Hence, this property is applied to protect the authentication data and further recover the potentially tampered regions if necessary. Finally, we also applied that code to vector quantization compression to improve the previous methods with good quality and few false positives. Wu, Wen-Chuan 吳汶涓 2015 學位論文 ; thesis 52 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 真理大學 === 資訊工程學系碩士班 === 103 === Image authentication is an important technology to protect image content integrity. Most of these methods use self-embedding technique, which embeds particular authentication data into the image itself. The embedded result is named an authenticated image, which must have very good quality such that it cannot perceive any differences between two highly similar images with the naked eye. When that image was illegally modified during the transmission via the public network, an image authentication method is able to extract the hidden data to determine whether an image has been tampered with or not. Further, the content of tampered regions could be restored back to its initial state in order to reduce the probability of image retransmission and save network bandwidth. This thesis proposed three image authentication methods. The first method is to adopt the stable singular values as authentication data and then hide them randomly into image pixels. However, false tampering detection might occur when some areas were tampered in such a way that the authentication data of the others make changes. In order to prevent this defect, therefore, this thesis attempt to represent the authentication data into a quick response (QR) code in the second method. The main reason is that a QR code possesses the capability of strong tolerance and error correction. It allows a QR code to be read correctly even if the code is slightly dirty or damaged. Hence, this property is applied to protect the authentication data and further recover the potentially tampered regions if necessary. Finally, we also applied that code to vector quantization compression to improve the previous methods with good quality and few false positives.
author2 Wu, Wen-Chuan
author_facet Wu, Wen-Chuan
LIN, Tzu-Wei
林子瑋
author LIN, Tzu-Wei
林子瑋
spellingShingle LIN, Tzu-Wei
林子瑋
A Study on Digital Image Authentication and Recovery Using 2D QR Codes
author_sort LIN, Tzu-Wei
title A Study on Digital Image Authentication and Recovery Using 2D QR Codes
title_short A Study on Digital Image Authentication and Recovery Using 2D QR Codes
title_full A Study on Digital Image Authentication and Recovery Using 2D QR Codes
title_fullStr A Study on Digital Image Authentication and Recovery Using 2D QR Codes
title_full_unstemmed A Study on Digital Image Authentication and Recovery Using 2D QR Codes
title_sort study on digital image authentication and recovery using 2d qr codes
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/56871403842520088790
work_keys_str_mv AT lintzuwei astudyondigitalimageauthenticationandrecoveryusing2dqrcodes
AT línziwěi astudyondigitalimageauthenticationandrecoveryusing2dqrcodes
AT lintzuwei jiéhéèrwéitiáomǎzhīyǐngxiàngyànzhèngyǔhuífùjīzhìzhīyánjiū
AT línziwěi jiéhéèrwéitiáomǎzhīyǐngxiàngyànzhèngyǔhuífùjīzhìzhīyánjiū
AT lintzuwei studyondigitalimageauthenticationandrecoveryusing2dqrcodes
AT línziwěi studyondigitalimageauthenticationandrecoveryusing2dqrcodes
_version_ 1718385206347431936