{"title":"DPCC and QR factorization-based color medical image authentication algorithm","authors":"Shewen Sun, S. Wei, Cong Wang","doi":"10.1109/IASP.2009.5054618","DOIUrl":null,"url":null,"abstract":"This paper presents a novel color medical image authentication scheme based on QR Factorization and Dual Pseudorandom Circular Chain (DPCC). The red component and the green component of the color image possess more brightness than the blue one, so QR Factorization values of the red component and the green component are used to be the initial values of logistic mapping to generate two watermarks. Then, the Least Significant Bit (LSB) plane of blue component by the watermarks is replaced according to DPCC. Experimental results show that the proposed algorithm is sensitive to malicious attacks on the watermarked image, and can localize the tampered region accurately.","PeriodicalId":143959,"journal":{"name":"2009 International Conference on Image Analysis and Signal Processing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Image Analysis and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IASP.2009.5054618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
This paper presents a novel color medical image authentication scheme based on QR Factorization and Dual Pseudorandom Circular Chain (DPCC). The red component and the green component of the color image possess more brightness than the blue one, so QR Factorization values of the red component and the green component are used to be the initial values of logistic mapping to generate two watermarks. Then, the Least Significant Bit (LSB) plane of blue component by the watermarks is replaced according to DPCC. Experimental results show that the proposed algorithm is sensitive to malicious attacks on the watermarked image, and can localize the tampered region accurately.