The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Cet article propose une méthode d'authentification d'image qui détecte la falsification et localise efficacement les zones falsifiées. L'efficacité de la méthode proposée est résumée par les trois points suivants. 1) Cette méthode offre une localisation grossière à fine des altérations en masquant les données hiérarchiques afin que toute détection d'altération ultérieure soit supprimée pour les blocs étiquetés comme authentiques dans la couche supérieure. 2) Étant donné que la description des caractéristiques de l'image dans la couche supérieure est masquée sur une image, la méthode proposée chiffre les données dans la couche supérieure plutôt que de chiffrer toutes les données de toutes les couches. 3) La méthode proposée est basée sur le schéma de masquage réversible des données qui n'utilise pas de technique de compression très coûteuse. Ces trois points rendent la méthode proposée supérieure aux méthodes conventionnelles utilisant des techniques de compression et aux méthodes utilisant le masquage de données à plusieurs niveaux qui nécessitent une vérification de l'intégrité dans de nombreux blocs, même si l'image est authentique. Les résultats de simulation montrent l'efficacité de la méthode proposée.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Seungwu HAN, Masaaki FUJIYOSHI, Hitoshi KIYA, "An Efficient Reversible Image Authentication Method" in IEICE TRANSACTIONS on Fundamentals,
vol. E91-A, no. 8, pp. 1907-1914, August 2008, doi: 10.1093/ietfec/e91-a.8.1907.
Abstract: This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e91-a.8.1907/_p
Copier
@ARTICLE{e91-a_8_1907,
author={Seungwu HAN, Masaaki FUJIYOSHI, Hitoshi KIYA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={An Efficient Reversible Image Authentication Method},
year={2008},
volume={E91-A},
number={8},
pages={1907-1914},
abstract={This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.},
keywords={},
doi={10.1093/ietfec/e91-a.8.1907},
ISSN={1745-1337},
month={August},}
Copier
TY - JOUR
TI - An Efficient Reversible Image Authentication Method
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1907
EP - 1914
AU - Seungwu HAN
AU - Masaaki FUJIYOSHI
AU - Hitoshi KIYA
PY - 2008
DO - 10.1093/ietfec/e91-a.8.1907
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E91-A
IS - 8
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - August 2008
AB - This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.
ER -