Composite chaos-based lossless image authentication and tamper localization.
Guangyong GaoPublished in: Multim. Tools Appl. (2013)
Keyphrases
- image authentication
- tamper detection
- lossy compression
- public key
- digital watermarking
- watermarking scheme
- image compression
- authentication scheme
- image content
- lossless compression
- jpeg compression
- copyright protection
- watermarking algorithm
- semi fragile
- signal processing
- data hiding
- bit rate
- security analysis
- pattern matching
- image features
- image processing