Recognition of Image Verification Using Lossless Predictive Coding

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Authentication of image plays a vital role in the end to end communication of file sharing system. In record sharing frameworks, there is a possibility for change of the first information by unapproved arbiters. In the proposed strategy, an exertion is advanced to perceive the vindictive assault in the first picture through prescient lossless coding. To approve the got picture, an encoded prescient quantized picture is utilized. This strategy gives the vital security other than honest to goodness varieties while identifying illicit changes. Lossless prescient coding gives productive encoding by misusing the connection between the projection of the first and got pictures.



  • Keywords

    Catchphrases Predictive lossless coding, Predictive RSA encryption and unscrambling.

  • References

      [1]. Javier Molina-Garcia, Rogelio Reyes-Reyes, Volodymyr Ponomaryov, Clara Cruz-Ramos,”Watermarking Algorithm for Authentication and Self-Recovery of Tampered Images Using DW”, IEEE 2016.

      [2]. S. Amir Hossein Tabatabaei, Obaid Ur-Rehman, Natasa Zivic and Christoph Ruland,”Secure and robust two phase image authentication”, 1520-9210 (c) 2015 IEEE

      [3]. G. Nian, X. Tang, D. Wang, H. Liu, "Print-scan resilient data hiding scheme applied in certificate verification", Proc. CISP, 2010.

      [4]. S. Tachaphetpiboon, K. Thongkor, T. Amornraksa, E.J. Delp, "Digital watermarking for color images in hue-saturation-value color space", Journal of Electronic Imaging, vol. 23, no. 3, 2014.

      [5]. P. Bas, J.M. Chassery, B. Macq, "Geometrically invariant watermarking using feature points", IEEE Trans. Image Process., vol. 11, no. 9, pp. 1014-1028, 2002.

      [6]. A. Bovik, "The Essential Guide to Image Processing" in Elsevier Inc., USA:, 2009.




Article ID: 15054
DOI: 10.14419/ijet.v7i2.19.15054

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.