A NEW METHOD FOR SELF-EMBEDDING IMAGE CONSTRUCTION

被引:0
|
作者
Alipour, Ghafour [1 ]
Parsai, Manouchehr [2 ]
机构
[1] Islamic Azad Univ, Hashtroud Branch, Hashtroud, Iran
[2] Univ Tehran, Tehran, Iran
关键词
DCT; Anti-tampering; LSB; Pixel; self-embedding;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we introduce two algorithms for self-embedding an image into itself as a means for protecting the image content. After self-embedding, it is possible to recover portions of the image that have been cropped out, replaced, damaged, or otherwise tampered. The algorithms is based on transforming small 8x8 blocks using a DCT, quantizing the coefficients, and carefully encoding them in the least significant bits of other distant squares. This method provides a very high quality of reconstruction but it is very fragile.
引用
收藏
页码:65 / +
页数:2
相关论文
共 50 条
  • [31] Multipurpose Image Watermarking Scheme based on Self-embedding and Data Hiding into Halftone image
    Santiago Avila, Carlos
    Nakano Miyatake, Mariko
    2010 IEEE ELECTRONICS, ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE (CERMA 2010), 2010, : 394 - 398
  • [32] Image encryption based on Logistic-Sine self-embedding chaotic sequence
    Wang, Jian
    Jiang, Wenjing
    Xu, Heming
    Wu, Xinpei
    Kim, Junseok
    OPTIK, 2022, 271
  • [33] Self-embedding and complexity in oral registers
    Verhoeven, Elisabeth
    Lehmann, Nico
    GLOSSA-A JOURNAL OF GENERAL LINGUISTICS, 2018, 3 (01):
  • [34] Fragile image watermarking scheme based on VQ index sharing and self-embedding
    Qin, Chuan
    Ji, Ping
    Wang, Jinwei
    Chang, Chin-Chen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2267 - 2287
  • [35] A ROI-BASED SELF-EMBEDDING METHOD WITH HIGH RECOVERY CAPABILITY
    Cai, Hongliang
    Liu, Huajian
    Steinebach, Martin
    Wang, Xiaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1722 - 1726
  • [36] Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method
    Dominguez-Conde, Gabriel
    Comesana, Pedro
    Perez-Gonzalez, Fernando
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 570 - 577
  • [37] The self-embedding theorem of WKL(o) and a non-standard method
    Tanaka, K
    ANNALS OF PURE AND APPLIED LOGIC, 1997, 84 (01) : 41 - 49
  • [38] Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
    Kim, Cheonshik
    Shin, Dongkyoo
    Yang, Ching-Nung
    Personal and Ubiquitous Computing, 2018, 22 (01): : 11 - 22
  • [39] A Triple Self-Embedding Fragile Watermarking Scheme for Image Tamper Detection and Recovery
    Ozkaya, Huseyin
    Aslantas, Veysel
    IEEE ACCESS, 2024, 12 : 140082 - 140096
  • [40] PERFOMANCE ANALYSIS OF THE FRIDRICH-GOLJAN SELF-EMBEDDING AUTHENTICATION METHOD
    Dominguez-Conde, Gabriel
    Comesana, Pedro
    Perez-Gonzalez, Fernando
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 1253 - 1256