完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChang, Yu-Jieen_US
dc.contributor.authorWang, Ran-Zanen_US
dc.contributor.authorLin, Ja-Chenen_US
dc.date.accessioned2014-12-08T15:12:54Z-
dc.date.available2014-12-08T15:12:54Z-
dc.date.issued2008en_US
dc.identifier.issn1687-6172en_US
dc.identifier.urihttp://hdl.handle.net/11536/9943-
dc.identifier.urihttp://dx.doi.org/10.1155/2008/860743en_US
dc.description.abstractThis study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to recover from tampering, the recovery data are shared by using an (r, n) threshold scheme and then scattered all over the image. Experimental results indicate that the visual quality of the watermarked image is acceptable, and that the positions of the tampered portions can be identified. Most importantly, the self-recovery result is very competitive. Copyright (C) 2008 Yu-Jie Chang et al.en_US
dc.language.isoen_USen_US
dc.titleA Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tamperingen_US
dc.typeArticleen_US
dc.identifier.doi10.1155/2008/860743en_US
dc.identifier.journalEURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSINGen_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000264770500001-
dc.citation.woscount2-
顯示於類別:期刊論文


文件中的檔案:

  1. 000264770500001.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。