完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Lee Shu-Tengen_US
dc.contributor.authorChen, Shang-Kuanen_US
dc.contributor.authorLin, Ja-Chenen_US
dc.date.accessioned2014-12-08T15:30:42Z-
dc.date.available2014-12-08T15:30:42Z-
dc.date.issued2011-07-01en_US
dc.identifier.issn1349-4198en_US
dc.identifier.urihttp://hdl.handle.net/11536/21936-
dc.description.abstractThis work presents an authentication and cross-recovery scheme to protect a group of n JPEG images. Given n images, the images are scaled down and then encoded using JPEG to create n recovery data. Based on a pre-determined threshold t, 2 <= t < n, the n recovery data are shared to create n shadows. Next, n authentication data are generated to identify malicious attacks on the system. Additionally, the n shadows and the n authentication data are embedded in the n JPEG codes of the n original images to form n JPEG stego codes, which can be stored in a distributed storage system. Moreover, in the daily maintenance of the storage system, the authentication data concealed inside these n JPEG stego codes are used to verify which ones have been attacked. If some (up to n - t) of the n JPEG stego codes are corrupted, the corrupted JPEG images can be recovered approximately using any t survived JPEG stego codes. Experimental results demonstrate the effectiveness of the proposed method. Comparisons with other image recovery methods are also included.en_US
dc.language.isoen_USen_US
dc.subjectCross recoveryen_US
dc.subjectImage authenticationen_US
dc.subjectReed-Solomon codesen_US
dc.subjectJPEGen_US
dc.titleAUTHENTICATION AND CROSS-RECOVERY OF MULTIPLE IMAGESen_US
dc.typeArticleen_US
dc.identifier.journalINTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROLen_US
dc.citation.volume7en_US
dc.citation.issue7Aen_US
dc.citation.spage3645en_US
dc.citation.epage3657en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000292626800006-
dc.citation.woscount0-
顯示於類別:期刊論文