19
Views
0
CrossRef citations to date
0
Altmetric
Research papers

Image authentication method using multiple mapping codebooks

&
Pages 85-94 | Received 20 Nov 2012, Accepted 19 Nov 2014, Published online: 03 Dec 2014

References

  • Chang CC, Fan YH and Tai WL. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn., 2008, 41, 654–661.
  • Celik MU, Sharmar G and Tekalp AM. Hierarchical Watermarking for secure image authentication with localization. IEEE Trans. Image Process., 2002, 11, (6), 585–594.
  • Patra JC, Phua JE and Bornand C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process., 2010, 20, 1597–1611.
  • Chan CS and Chang CC. An efficient image authentication method based on Hamming Code. Pattern Recogn., 2007, 40, (2), 681–690.
  • Lee TY and Lin SD. Dual watermark for image tamper detection and recovery. Pattern Recogn., 2008, 41, 3497–3506.
  • Wang SS and Tsai SL. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn., 2008, 41, 701–712.
  • Yang CW and Shen JJ. Recover the tampered image based on VQ indexing. Signal Process., 2010, 90, 331–343.
  • Hamming RW. Error detecting and error correcting codes. Bell Syst. Tech. J., 1950, 26, (2), 147–160.
  • Chan CS. An image authentication method by applying Hamming Code on rearranged bits. Pattern Recogn. Lett., 2011, 32, 1679–1690.
  • Lin RD, Chen TH, Huang CC, Lee WB and Chen WS. A secure image authentication scheme with tampering proof and remedy based on Hamming Code. Int. J. Innov. Comput. Inform. Control, 2009, 5, (8), 1349–4198.
  • Voyatzis G and Pitas I. Chaotic mixing of digital images and applications to watermarking. Proc. Eur. Conf. Multimed. Appl., 1996, 2, 687–695.
  • Thien CC. and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn., 2003, 36, (12), 2875–2881.
  • Serra J. Image Analysis and Mathematical Morphology, 1982 (Academic Press, New York).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.