RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Novel Authentication Scheme for Lossy Compressed Images

        Mona A. M. Fouad,Ahmed Mokhtar A. Mansour 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.6

        In this paper, a novel scheme is proposed for watermarking lossy compressed images just before transmission and authenticating them once they are received, away from the core of the compression and de-compression processes. The scheme is inserted into the Joint Photographic Expert Group (JPEG) structure that is encoded using the Discrete Cosine Transform (DCT) at specified locations. The watermark information is extracted from and embedded into specified DCT coefficients, following novel criteria. The scheme is robust to lossy compression; though it is fragile, exposing any slight changes of the probe images. The scheme is also blind, needs no prior information about the original image or the watermark information to authenticate the received image. Experimentally, if the received watermarked data is not manipulated, the proposed scheme verifies them as ‘authenticated’. On the other side, if geometrical or image processing attacks are applied to the watermarked images, they are then verified successfully as ‘not authenticated’. The proposed scheme is further evaluated and compared to similar authentication schemes. The noise added to the original image due to embedding the watermark information is 0.063 dB (decibel), overcoming all results in the reviewed literature.

      • ‘Hop Horse’ Image Authentication Scheme

        Mona A. M. Fouad,Ahmed Mokhtar A. Mansour 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.5

        This paper proposes a novel scheme for securing and authenticating digital data. Although, the experiments were applied to digital images, it is valid for sound, and video without any modifications of the core scheme. The developed scheme could be applied to the encoded data at the sender and the receiver sides, apart from the compression and decompression processes. The watermark information is generated automatically from the input data and hidden into the Least Significant Bits (LSBs) of specified pixels according to innovative criteria. Experimentally, the received data is authenticated if it is 100% match the sent data, exposing both geometric and signal processing attacks. The hidden watermark is completely invisible, achieving Peak Signal to Noise Ratio (PSNR) more than 67 decibels (dB) for grayscale images that vary in size and content. The developed scheme is evaluated by verifying images of the testing set before and after tampering, showing comparable performance. A comprehensive analysis for the experimental results revealed performance and efficiency of the proposed scheme is presented. An extensive review of previous work concerning image authentication approaches is presented, showing the need for robust and powerful authentication scheme.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼