Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging

Cited 22 time in webofscience Cited 0 time in scopus
  • Hit : 339
  • Download : 2
DC FieldValueLanguage
dc.contributor.authorKim K.S.ko
dc.contributor.authorLee M.J.ko
dc.contributor.authorLee J.W.ko
dc.contributor.authorOh T.W.ko
dc.contributor.authorLee H.Y.ko
dc.date.accessioned2013-03-08T23:07:52Z-
dc.date.available2013-03-08T23:07:52Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2011-09-
dc.identifier.citationCOMPUTER VISION AND IMAGE UNDERSTANDING, v.115, no.9, pp.1308 - 1323-
dc.identifier.issn1077-3142-
dc.identifier.urihttp://hdl.handle.net/10203/94604-
dc.description.abstractThis paper presents a region-based tampering detection and restoring scheme that exploits both lossless (reversible) data hiding and image homogeneity analysis for image authentication and integrity verification. The proposed scheme enables the detection of a tampered region and then recovers it by using the embedded information selected as the recovery feature. Moreover, since reversibility helps in taking the correct decision during image analysis, it is highly desired in quality-sensitive imaging such as medical imaging and satellite imaging, where even minimal distortion introduced by embedding data is unacceptable. To extract the recovery feature, we analyze the image homogeneity using quad-tree decomposition, which adaptively divides a square image into several variable-sized blocks, and choose the average value of each block as the feature. This makes the length of the feature more efficient while ensuring that the visual quality of the restored image is better than that in the case of the conventional fixed-size block-based approach. Through experiments on 8-bit, 12-bit, and 16-bit images, we demonstrate the effectiveness of tampering localization of the proposed method and show that restoration is achieved with high visual quality. (C) 2011 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.publisherACADEMIC PRESS INC ELSEVIER SCIENCE-
dc.subjectWATERMARKING-
dc.subjectAUTHENTICATION-
dc.subjectIMAGES-
dc.titleRegion-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging-
dc.typeArticle-
dc.identifier.wosid000293258800004-
dc.identifier.scopusid2-s2.0-79958791172-
dc.type.rimsART-
dc.citation.volume115-
dc.citation.issue9-
dc.citation.beginningpage1308-
dc.citation.endingpage1323-
dc.citation.publicationnameCOMPUTER VISION AND IMAGE UNDERSTANDING-
dc.identifier.doi10.1016/j.cviu.2011.05.001-
dc.contributor.nonIdAuthorKim K.S.-
dc.contributor.nonIdAuthorLee J.W.-
dc.contributor.nonIdAuthorOh T.W.-
dc.contributor.nonIdAuthorLee H.Y.-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorContent authentication-
dc.subject.keywordAuthorHomogeneity analysis-
dc.subject.keywordAuthorQuad-tree decomposition-
dc.subject.keywordAuthorTampering detection-
dc.subject.keywordAuthorTampering recovery-
dc.subject.keywordPlusWATERMARKING-
dc.subject.keywordPlusAUTHENTICATION-
dc.subject.keywordPlusIMAGES-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 22 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0