Research Article

Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing

Figure 6

Compression and encryption with authentication ability when compression ratio is . (a, b, c, d, e, f, g-1, 2, 3) Standard images “Camera,” “Lena,” and “Baboon” of sizes used for testing; (a-1, 2, 3) final encrypted and hidden image (i.e., the received image); (b-1, 2, 3) combined image by inverse permutation and inverse diffusion; (c-1, 2, 3) VQ image reconstructed by preshared codebook; (d-1, 2, 3) error matrix by CS and inverse permutation; (e-1, 2, 3) reconstructed image with (c-1, 2, 3) and (d-1, 2, 3); (f-1, 2, 3) decoded image by inverse DRPE; (g-1, 2, 3) authentication with (e-1, 2, 3) and (f-1, 2, 3).
(a)
(b)
(c)
(d)
(e)
(f)
(g)