7,394 research outputs found

    Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Get PDF
    [[abstract]]A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users’ secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.[[incitationindex]]SCI[[booktype]]紙本[[booktype]]電子

    An Adaptive Reversible Image Watermarking Scheme Based on Integer Wavelet Coefficients

    Get PDF
    [[abstract]]This paper presents an integer wavelet coefficients based reversible image watermarking scheme. A reversible image watermarking approach extracts the embedded watermarks from a watermarked image and recovers the watermarked image to the original image simultaneously. The proposed approach first applies the host image to 3-layered integer wavelet transform. Nine subimages are acquired from the 3-layered integer wavelet transform. Each subimage is then segmented to blocks of size 2LX2L, where L is determined by structure of the subimage. Then, reversible watermarks are embedded into differences between central ordered pixel and other pixels in each block. Largest difference in each block determines the embedded quantity in each difference. Experimental results show that the proposed adaptive block size scheme has higher capacity and quality ratio than previous works.[[notice]]補正完畢[[incitationindex]]EI[[booktype]]紙

    Difference-Expansion Based Reversible and Visible Image Watermarking Scheme

    Get PDF
    [[conferencetype]]國內[[conferencedate]]20150817~20150819[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]JiaoSi, Taiwa

    Robust Copy-move Forgery Detection through Invariant Moment Features

    Get PDF
    [[notice]]補正完畢[[conferencedate]]20161114~2016111

    DCT-Based Zero Replacement Reversible Image Watermarking Approach

    Get PDF
    [[abstract]]Reversible watermarking recovers an original image from a watermarked image by extracting the embedded watermarks. This work presents a reversible image watermarking approach that works on quantized DCT coefficients, implying that the original quantized image can be recovered perfectly after watermark extraction. The concept of zero replacement reversible watermarking is presented. Two parameters adjustment rules, ZRE and ZRX, are first proposed to embed and extract one bit to DCT coefficients, respectively. Additionally, the CA rule is presented to prevent confusion during embedding and extraction. Watermark embedding and extracting algorithms based on these three rules are then proposed. Experimental results indicate that the quality of watermarked image is very good, and that the proposed approach can also identify maliciously attacked regions efficiently. The proposed approach is also compared with other watermarking methods, demonstrating that the proposed approach works well.[[incitationindex]]SCI[[booktype]]紙
    corecore