Research Article

Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing

Figure 5

Detailed experimental results for the decryption and authentication. (a) Received image; (b) only-permuted image by inverse-diffusion; (c) combined image by inverse permutation; (d) VQ image with preshared codebook ; (e) error matrix by CS reconstruction and inverse permutation; (f) reconstructed image with (d) and (e) ; (g) converted binary image by extracted authentication from (c); (h) extracted phase image by inverse quantization (g); (i) decoded image by inverse DRPE; (j) authentication with (f) and (i) .
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)