Research Article
Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing
Figure 5
Detailed experimental results for the decryption and authentication. (a) Received image; (b) only-permuted image by inverse-diffusion; (c) combined image by inverse permutation; (d) VQ image with preshared codebook ; (e) error matrix by CS reconstruction and inverse permutation; (f) reconstructed image with (d) and (e) ; (g) converted binary image by extracted authentication from (c); (h) extracted phase image by inverse quantization (g); (i) decoded image by inverse DRPE; (j) authentication with (f) and (i) .
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |