Research Article
Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing
Figure 11
Authentication results of our DRPE-CSVQ under cropping attack with the cropping size . (a, b, c, d, e, f-1, 2, 3) Standard images “Camera,” “Lena,” and “Baboon” used for testing; (a-1, 2, 3) the encrypted images suffering from the cropping size ; (b-1, 2, 3) the reconstructed images with error compensation; (c-1, 2, 3) the reconstructed images without error compensation; (d-1, 2, 3) the reconstructed images corresponding to the images (c-1, 2, 3); (e-1, 2, 3) the decoded images by inverse DRPE; (f-1, 2, 3) the authentication results between the images (d-1, 2, 3) and the images (e-1, 2, 3).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |