Regular Articles

Authentication and recovery of an image by sharing and lattice-embedding

[+] Author Affiliations
Sian-Jheng Lin

National Chiao Tung University, Department of Computer Science, 1001 Ta Hsueh Road, Hsinchu, 300, Taiwan

Ja-Chen Lin

National Chiao Tung University, Department of Computer Science, 1001 Ta Hsueh Road, Hsinchu, 300, Taiwan

J. Electron. Imaging. 19(4), 043008 (December 06, 2010). doi:10.1117/1.3500799
History: Received December 21, 2009; Revised July 26, 2010; Accepted August 25, 2010; Published December 06, 2010; Online December 06, 2010
Text Size: A A A

Based on sharing and lattice-embedding techniques, we present an authentication-recovery method for an image. The recovery data are shared among many shadows, then lattice-embedding is utilized to embed each shadow in the discrete cosine transform domain of an 8×8 block. The proposed method can resist certain content-preserving operations such as JPEG compression, Gaussian noise, and brightness adjustment, up to a tolerance level controlled by a quantization parameter value. The method can also resist certain security attacks such as a cut-and-paste attack, a collage attack, and a vector quantization attack. Compared with previous works, the proposed method has following major advantages and novelty: (1) the method does not require prediction of the tampering trace, and the tampered blocks are always recovered as long as the number of valid blocks reaches a threshold and (2) lattice-embedding yields smaller distortion than does parity-check quantization, and the latter was often used in reported works.

Figures in this Article
© 2010 Society of Photo-Optical Instrumentation Engineers

Citation

Sian-Jheng Lin and Ja-Chen Lin
"Authentication and recovery of an image by sharing and lattice-embedding", J. Electron. Imaging. 19(4), 043008 (December 06, 2010). ; http://dx.doi.org/10.1117/1.3500799


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.