文化大學機構典藏 CCUR:Item 987654321/21005
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 47121/50987 (92%)
Visitors : 13825938      Online Users : 310
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/21005


    Title: Probability-based tampering detection scheme for digital images
    Authors: Hsu, CS (Hsu, Ching-Sheng)
    Tu, SF (Tu, Shu-Fen)
    Contributors: 資管系
    Date: 2010-12
    Issue Date: 2011-12-12 13:20:08 (UTC+8)
    Abstract: In recent years, digital watermarking technology has been widely used for property rights protection and integrity authentication of digital images. Image integrity authentication is usually done by a fragile watermarking scheme. When authenticating image integrity, one must extract the embedded authentication message from the image for comparison with the image feature to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentication schemes may result in detection error problems. Namely, the tampered area may be misjudged as not having been tampered with, or vice versa. Hence, methods that effectively reduce errors in tampering detection have become an important research topic. This study aims to integrate a probability theory to improve image tampering detection accuracy and precision. The scheme includes two processes: the embedding of an image authentication message and tampering detection. In the image tampering detection process, in addition to identifying whether the image has been tampered with and locating the tampered area, through the authentication message embedded in the image, a probability theory is employed to improve previously obtained detection results to enhance authentication accuracy. The experimental results reveal that the proposed scheme performs well in terms of detection precision and authentication accuracy rate. (C) 2009 Elsevier B.V. All rights reserved.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] periodical articles

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML652View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback