Research Article
Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing
Figure 6
Compression and encryption with authentication ability when compression ratio is . (a, b, c, d, e, f, g-1, 2, 3) Standard images “Camera,” “Lena,” and “Baboon” of sizes used for testing; (a-1, 2, 3) final encrypted and hidden image (i.e., the received image); (b-1, 2, 3) combined image by inverse permutation and inverse diffusion; (c-1, 2, 3) VQ image reconstructed by preshared codebook; (d-1, 2, 3) error matrix by CS and inverse permutation; (e-1, 2, 3) reconstructed image with (c-1, 2, 3) and (d-1, 2, 3); (f-1, 2, 3) decoded image by inverse DRPE; (g-1, 2, 3) authentication with (e-1, 2, 3) and (f-1, 2, 3).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |