完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chen, Chien-Chang | |
dc.contributor.author | Ke, Husan-An | |
dc.date.accessioned | 2009-06-02T07:05:05Z | |
dc.date.accessioned | 2020-05-25T06:48:07Z | - |
dc.date.available | 2009-06-02T07:05:05Z | |
dc.date.available | 2020-05-25T06:48:07Z | - |
dc.date.issued | 2009-02-12T01:28:03Z | |
dc.date.submitted | 2009-02-11 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/11198 | - |
dc.description.abstract | Image authentication techniques verify he ntegrity of an image from malicious manipulations.In his paper, aDCT-basedmage authenication approach wthattack recovery, which recoverssome attacked bocks, is proposed. Two quantizationproperties DQP and FQP are presented toembedauthentication feature. These embedded features are olerantto JPEG compression wih quantization stepless than twoimes of the pe-determined quantization step, bus sensitive toother maliciousattacks. Theattacked blocks are indicaed after verifying a protected mageand hen the embedded recoveryfeature isextracted to recover these damaged blocks.Moreover, in case of he damage of recovery feature, an edge-based interpolation recovery approach (EIRA) s proposed o enhance recovery results. Expermental results showhat the atacked blocks can be deeced and recovered efficienty by the proposed approach. | |
dc.description.sponsorship | 淡江大學,台北縣 | |
dc.format.extent | 6p. | |
dc.relation.ispartofseries | 2008 ICS會議 | |
dc.subject | JPEG compression | |
dc.subject | image authentication | |
dc.subject | DCT quantization | |
dc.subject | image recovery | |
dc.subject.other | Image Processing | |
dc.title | Authenticate an Image under DCT Domain with Attack Recovery | |
分類: | 2008年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics002008000142.pdf | 438.62 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。