Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 350753, 9 pages
http://dx.doi.org/10.1155/2014/350753
Research Article

Color Image Authentication and Recovery via Adaptive Encoding

1Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan
2Department of Information Management, Chaoyang University of Technology, Taichung City 41349, Taiwan
3Department of Computer and Communication, Shu-Te University, Kaohsiung 82445, Taiwan

Received 18 March 2014; Accepted 13 August 2014; Published 28 August 2014

Academic Editor: Sabri Arik

Copyright © 2014 Chun-Hung Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. L. Lin, C. Hsieh, and P. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Wang and S. Tsai, “Automatic image authentication and recovery using fractal code embedding and image inpainting,” Pattern Recognition, vol. 41, no. 2, pp. 701–712, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  3. X. Zhang and S. Wang, “Fragile watermarking with error-free restoration capability,” IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1490–1499, 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. T. Lee and S. D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, no. 11, pp. 3497–3506, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  5. H. J. He, J. S. Zhang, and F. Chen, “Adjacent-block based statistical detection method for self-embedding watermarking techniques,” Signal Processing, vol. 89, no. 8, pp. 1557–1566, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Qin, C. Chang, and P. Chen, “Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism,” Signal Processing, vol. 92, no. 4, pp. 1137–1150, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. Qian, G. Feng, X. Zhang, and S. Wang, “Image self-embedding with high-quality restoration capability,” Digital Signal Processing: A Review Journal, vol. 21, no. 2, pp. 278–286, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. M. S. Wang and W. C. Chen, “A majority-voting based watermarking scheme for color image tamper detection and recovery,” Computer Standards and Interfaces, vol. 29, no. 5, pp. 561–570, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. K. C. Liu, “Colour image watermarking for tamper proofing and pattern-based recovery,” IET Image Processing, vol. 6, no. 5, pp. 445–454, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. A. Gersho and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic, Boston, Mass, USA, 1992.
  11. Y. Linde, A. Buzo, and R. M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications Systems, vol. 28, no. 1, pp. 84–95, 1980. View at Google Scholar · View at Scopus
  12. J. MacQueen, “Some methods for classification and analysis of multivariate observations,” in Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281–297, 1967.
  13. E. Forgy, “Cluster analysis of multivariate data: efficiency versus interpretability of classifications,” Biometrics, vol. 21, no. 3, pp. 768–769, 1965. View at Google Scholar
  14. D. Eastlake and P. Jones, “US secure hash algorithm 1 (SHA1),” Tech. Rep. 3174, IETF Request for Comments, 2001. View at Google Scholar
  15. B. Sklar, Digital Communications: Fundamentals and Applications, Prentice-Hall, Englewood Cliffs, NJ, USA, 2nd edition, 2001.
  16. G. Voyatzis and I. Pitas, “Chaotic mixing of digital images and applications to watermarking,” in Proceedings of the European Conference Multimedia Application, Service, and Techniques, vol. 2, pp. 687–695, 1996.