完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Chien-Chang
dc.contributor.authorKe, Husan-An
dc.date.accessioned2009-06-02T07:05:05Z
dc.date.accessioned2020-05-25T06:48:07Z-
dc.date.available2009-06-02T07:05:05Z
dc.date.available2020-05-25T06:48:07Z-
dc.date.issued2009-02-12T01:28:03Z
dc.date.submitted2009-02-11
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/11198-
dc.description.abstractImage authentication techniques verify he ntegrity of an image from malicious manipulations.In his paper, aDCT-basedmage authenication approach wthattack recovery, which recoverssome attacked bocks, is proposed. Two quantizationproperties DQP and FQP are presented toembedauthentication feature. These embedded features are olerantto JPEG compression wih quantization stepless than twoimes of the pe-determined quantization step, bus sensitive toother maliciousattacks. Theattacked blocks are indicaed after verifying a protected mageand hen the embedded recoveryfeature isextracted to recover these damaged blocks.Moreover, in case of he damage of recovery feature, an edge-based interpolation recovery approach (EIRA) s proposed o enhance recovery results. Expermental results showhat the atacked blocks can be deeced and recovered efficienty by the proposed approach.
dc.description.sponsorship淡江大學,台北縣
dc.format.extent6p.
dc.relation.ispartofseries2008 ICS會議
dc.subjectJPEG compression
dc.subjectimage authentication
dc.subjectDCT quantization
dc.subjectimage recovery
dc.subject.otherImage Processing
dc.titleAuthenticate an Image under DCT Domain with Attack Recovery
分類:2008年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002008000142.pdf438.62 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。