A Technique for Image Authentication

碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 90 === As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying...

Full description

Bibliographic Details
Main Authors: Chung-Wei Tsai, 蔡中瑋
Other Authors: Yuan-Liang Tang
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/12948829473620349269
id ndltd-TW-090CYUT0396001
record_format oai_dc
spelling ndltd-TW-090CYUT03960012015-10-13T17:35:25Z http://ndltd.ncl.edu.tw/handle/12948829473620349269 A Technique for Image Authentication 數位影像驗證法 Chung-Wei Tsai 蔡中瑋 碩士 朝陽科技大學 資訊管理系碩士班 90 As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying of digital products become a serious problem. How to protect the right of legal users and the copyright of original producers thus becomes an active research area. Among various technologies for digital product protection, image authentication has received extensive attentions. Researchers have developed a number of methods to identify if an image has experienced illegal modifications. For examples, images can be authenticated by image feature comparison, by digital signatures, and by error control coding. Most of them, however, can only detect if a "portion" of an image is modified, as a tradeoff of simplicity, efficiency, or specific requirements for certain applications. There are very few techniques that can identify image tampering up to one-pixel level. In this research, we will first review current important techniques for digital product protection in general, and then propose a method that is able to locate image tampering up to one-pixel level. This technique is very important if the image content is not allowed for modification, especially when the image is used for legal purposes. Yuan-Liang Tang 唐元亮 2002 學位論文 ; thesis 49 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 90 === As digital technologies advance, more and more publications such as digital images and the MP3 music products are produced in the digital format and transmitted through the Internet. Accompanying the advent of such digital world, however, illegal use and copying of digital products become a serious problem. How to protect the right of legal users and the copyright of original producers thus becomes an active research area. Among various technologies for digital product protection, image authentication has received extensive attentions. Researchers have developed a number of methods to identify if an image has experienced illegal modifications. For examples, images can be authenticated by image feature comparison, by digital signatures, and by error control coding. Most of them, however, can only detect if a "portion" of an image is modified, as a tradeoff of simplicity, efficiency, or specific requirements for certain applications. There are very few techniques that can identify image tampering up to one-pixel level. In this research, we will first review current important techniques for digital product protection in general, and then propose a method that is able to locate image tampering up to one-pixel level. This technique is very important if the image content is not allowed for modification, especially when the image is used for legal purposes.
author2 Yuan-Liang Tang
author_facet Yuan-Liang Tang
Chung-Wei Tsai
蔡中瑋
author Chung-Wei Tsai
蔡中瑋
spellingShingle Chung-Wei Tsai
蔡中瑋
A Technique for Image Authentication
author_sort Chung-Wei Tsai
title A Technique for Image Authentication
title_short A Technique for Image Authentication
title_full A Technique for Image Authentication
title_fullStr A Technique for Image Authentication
title_full_unstemmed A Technique for Image Authentication
title_sort technique for image authentication
publishDate 2002
url http://ndltd.ncl.edu.tw/handle/12948829473620349269
work_keys_str_mv AT chungweitsai atechniqueforimageauthentication
AT càizhōngwěi atechniqueforimageauthentication
AT chungweitsai shùwèiyǐngxiàngyànzhèngfǎ
AT càizhōngwěi shùwèiyǐngxiàngyànzhèngfǎ
AT chungweitsai techniqueforimageauthentication
AT càizhōngwěi techniqueforimageauthentication
_version_ 1717782994018631680