- 1、本文档共16页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A Content-Based Image Authentication SystemWith Lossless Data Hiding
A Content-Based Image Authentication SystemWith Lossless Data Hiding Authors: Dekun Zou, Chai Wah Wu, Guorong Xuan, Yun Q. ShiSource : Multimedia and Expo, 2003. ICME 03. Proceedings. 2003 International Conference on ,? Volume: 2 ,?6-9 July 2003 Pages:213 – 216 Speaker: Jui-Yi ChangAdvisor: Chin-Chen ChangDate: 2004/4/28 outline Introduction Generation of information for authentication Tag embedding Verification procedure Experiment results Conclusions Introduction Authentication of multimedia data provides an answer to protect the data integrity of it. Two problem:a. How tolerant is it to minor modifications?b. how hard is it to forge an authentic image? Extend the approach in the other papers to watermarking or data hiding solutions by combining it with a lossless data hiding technique and demonstrate its robustness and effectiveness. Generation of information for authentication Tag Embedding (Cont.) Using circular histogram algorithm. Divided into 8 by 8 blocks. The 64 pixels in each block are pseudo-randomly equally divided into group A and B. For each group, the histogram of the gray scale value is mapped onto circle. The gray level of pixels is quantized into Q ranges. The size of a range is P=256/Q. Tag Embedding (Cont.) Tag Embedding (Cont.) Tag Embedding (Cont.) To embed “1”C’=C+P for pixels in group AC’=C-P for pixels in group B To embed “0”C’=C-P for pixels in group AC’=C+P for pixels in group B Tag Embedding (Cont.) The centers of mass of group A and group B may be so far away that error will occur when extracting. To avoid this problem, such blocks are skipped when embedding information. Verification procedure Verification procedure (Cont.) Result in failure of the verification:(a) if the image is degraded too much so that the embedded tag could not be extracted correctly.(b) When the tag extraction is correct, but the image is corrupted such that the quantized features do not verify with the extracted signature S. Experiment
您可能关注的文档
- 2013八年级上册英语第四单元导学案.doc
- 2013八年级英语Unit4What’s_the_best_movie_theater_课件1a_1c.ppt
- 2013届高考英语一轮复习课件:Unit 3 A taste of English humo(人教版必修4.ppt
- 2013年八年级英语上册 Unit 4 What’s the best movie theater2a-3c课件.ppt
- 2013年秋八年级英语上册《Unit 4 Whats the best movie theate》Section A 1课件 (新版)人教新目标版.ppt
- 2013年高考英语(新人教版)要点梳理+重点突破:必修4 Unit3《A taste of English humour》.doc
- 2014年南开大学大学英语三作业题.doc
- 2014版9年级第五单元第5课时.doc
- 2016聚焦中考英语(人教版)考点聚焦课件 第6讲 八年级(上)Units 1~3.ppt
- 2016聚焦中考英语(人教版)考点聚焦课件 第15讲 九年级Units 1~2.ppt
- 劳动合同法对教育培训行业教师的适用性分析.doc
- 劳动合同法对农业领域劳动者的规制研究.doc
- 企业社会责任(CSR)与人力资源管理的结合点.doc
- 2024-2030年中国医疗IT行业市场深度分析及前景趋势与投资研究报告.docx
- 2024-2030年中国医疗器械租赁行业经营状况与未来投资风险评估研究报告.docx
- 2024-2030年中国医药中间体行业市场发展趋势与前景展望战略分析报告.docx
- 2024-2030年中国医疗高光谱成像(HSI)系统行业市场发展趋势与前景展望战略分析报告.docx
- 2024-2030年中国医用氧气系统行业市场发展趋势与前景展望战略分析报告.docx
- 2024-2030年中国医师包行业市场发展趋势与前景展望战略分析报告.docx
- 2024-2030年中国压缩机雾化器行业销售态势与竞争前景预测报告.docx
文档评论(0)