Font Size: a A A

Research Of Image Authentication Algorithm On Restoring And Detection Tampered Image

Posted on:2009-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y FengFull Text:PDF
GTID:2298360245988818Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the wide use of multimedia technology in the information age, it is easy to edit, replicate, transmit, and distribute digital content that is unauthorized, which facilitate the people, at the same time, the attacker can tamper any digital content easily and with no trace. How to authenticate the received image and how to restore the tampered region of the image has become a very active research hotspot in image research area. Many algorithms have been proposed to solve it, but some algorithms only can detect the tamped region of image, but can not restore it; some algorithms can detect and restore the tampered area, but can not resist the involuntary attacks; some algorithm can restore the image, but the restored image quality is not enough good. So in allusion to solve above problem, the author of this paper have made some research on the image authentication algorithm which can detect and restore the tampered image, the main research in this paper as follows:(1) A new image authentication scheme has been proposed, which make use of two good properties of image: the image block average grayscales and the two neighboring DWT coefficients keep unchanged when the image is subjected common image processing operations. The simulate results demonstrate that the proposed algorithm is not only able to detect and recover the tampered regions but also has good robustness to resist the involuntary attacks such as JPEG compression and sensitive to any malicious attacks.(2) An image authentication algorithm based on image halftoning technology has been improved, which make use of the good property that the image block average grayscales keep uncharged when the image is subjected common image processing operations, The simulate results demonstrate that the proposed algorithm is not only able to detect and recover the tampered regions, but greatly improves the robustness to resist the involuntary attacks such as JPEG compression and combined attacks.
Keywords/Search Tags:image authentication, detect and restore tampered region, involuntary attacks, malicious attacks
PDF Full Text Request
Related items