On the security of a BTC-based-compression image authentication scheme.
Tzung-Her ChenTzu-Ching ChangPublished in: Multim. Tools Appl. (2018)
Keyphrases
- authentication scheme
- image authentication
- block truncation coding
- user authentication
- multiscale
- image compression
- secret key
- smart card
- tampering detection
- network security
- compression scheme
- public key
- similarity measure
- key management
- lossy compression
- security analysis
- region of interest
- image encryption
- least significant bit
- high resolution
- information security
- watermarking technique
- digital images