Image authentication is applied to protect the integrity of the digital image. Conventional image authentication mechanisms, however, are unfit for the palette-based color images. Palette-based color images such as GIF images are commonly used for media communications. This article proposes a palette-based color image authentication mechanism. This novel scheme can guarantee the essentials of general authentication schemes to protect palette-based color images. Morphological operations are adopted to draw out the tampered area precisely. According to the experimental results, the images embedded with the authentication data still can preserve high image quality; specifically, the new scheme is highly sensitive to altered areas.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Chin-Chen CHANG, Pei-Yu LIN, "A Color Image Authentication Method Using Partitioned Palette and Morphological Operations" in IEICE TRANSACTIONS on Information,
vol. E91-D, no. 1, pp. 54-61, January 2008, doi: 10.1093/ietisy/e91-d.1.54.
Abstract: Image authentication is applied to protect the integrity of the digital image. Conventional image authentication mechanisms, however, are unfit for the palette-based color images. Palette-based color images such as GIF images are commonly used for media communications. This article proposes a palette-based color image authentication mechanism. This novel scheme can guarantee the essentials of general authentication schemes to protect palette-based color images. Morphological operations are adopted to draw out the tampered area precisely. According to the experimental results, the images embedded with the authentication data still can preserve high image quality; specifically, the new scheme is highly sensitive to altered areas.
URL: https://global.ieice.org/en_transactions/information/10.1093/ietisy/e91-d.1.54/_p
Copy
@ARTICLE{e91-d_1_54,
author={Chin-Chen CHANG, Pei-Yu LIN, },
journal={IEICE TRANSACTIONS on Information},
title={A Color Image Authentication Method Using Partitioned Palette and Morphological Operations},
year={2008},
volume={E91-D},
number={1},
pages={54-61},
abstract={Image authentication is applied to protect the integrity of the digital image. Conventional image authentication mechanisms, however, are unfit for the palette-based color images. Palette-based color images such as GIF images are commonly used for media communications. This article proposes a palette-based color image authentication mechanism. This novel scheme can guarantee the essentials of general authentication schemes to protect palette-based color images. Morphological operations are adopted to draw out the tampered area precisely. According to the experimental results, the images embedded with the authentication data still can preserve high image quality; specifically, the new scheme is highly sensitive to altered areas.},
keywords={},
doi={10.1093/ietisy/e91-d.1.54},
ISSN={1745-1361},
month={January},}
Copy
TY - JOUR
TI - A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
T2 - IEICE TRANSACTIONS on Information
SP - 54
EP - 61
AU - Chin-Chen CHANG
AU - Pei-Yu LIN
PY - 2008
DO - 10.1093/ietisy/e91-d.1.54
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E91-D
IS - 1
JA - IEICE TRANSACTIONS on Information
Y1 - January 2008
AB - Image authentication is applied to protect the integrity of the digital image. Conventional image authentication mechanisms, however, are unfit for the palette-based color images. Palette-based color images such as GIF images are commonly used for media communications. This article proposes a palette-based color image authentication mechanism. This novel scheme can guarantee the essentials of general authentication schemes to protect palette-based color images. Morphological operations are adopted to draw out the tampered area precisely. According to the experimental results, the images embedded with the authentication data still can preserve high image quality; specifically, the new scheme is highly sensitive to altered areas.
ER -