Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Reversible Watermarking Authentication Algorithm For Color Images Based On Compressed Sensing

View through CrossRef
Abstract Aiming at the shortcomings of existing reversible watermarking for image authentication, such as poor ability of tamper detection and localization, and low attention of reconstruction after tampering, a reversible watermarking authentication algorithm based on compressed sensing for color image was proposed. On the side of the sender, the original image has been divided into blocks and carried out compressed sensing to generate image hash which works as the watermark information, and was embedded by the reversible watermarking of difference histogram algorithm. On the side of the receiver, watermark was extracted for authentication. For the tampered block which was failed in authentication, original image will be restored by reconstruction of compressed sensing. Experimental results show that the algorithm combines of reversible watermarking and compressed sensing, so that the detection rate of image authentication has been improved, as well as the robustness to resist sparse noise and cutting and the ability to reconstruct the original image
Title: Reversible Watermarking Authentication Algorithm For Color Images Based On Compressed Sensing
Description:
Abstract Aiming at the shortcomings of existing reversible watermarking for image authentication, such as poor ability of tamper detection and localization, and low attention of reconstruction after tampering, a reversible watermarking authentication algorithm based on compressed sensing for color image was proposed.
On the side of the sender, the original image has been divided into blocks and carried out compressed sensing to generate image hash which works as the watermark information, and was embedded by the reversible watermarking of difference histogram algorithm.
On the side of the receiver, watermark was extracted for authentication.
For the tampered block which was failed in authentication, original image will be restored by reconstruction of compressed sensing.
Experimental results show that the algorithm combines of reversible watermarking and compressed sensing, so that the detection rate of image authentication has been improved, as well as the robustness to resist sparse noise and cutting and the ability to reconstruct the original image.

Related Results

Crescimento de feijoeiro sob influência de carvão vegetal e esterco bovino
Crescimento de feijoeiro sob influência de carvão vegetal e esterco bovino
<p align="justify"><span style="color: #000000;"><span style="font-family: 'Times New Roman', serif;"><span><span lang="pt-BR">É indiscutível a import...
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression...
Boja kao izlagački aspekt narativnoga filma
Boja kao izlagački aspekt narativnoga filma
The dissertation, titled Colour as an Expository Aspect of the Narrative Film, explores how color shapes the narrative, aesthetic, and emotional dimensions of film. Analyzing the h...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...

Back to Top