{"title":"生成防篡改图像的源信道编码方法","authors":"D. Nishma, S. Jeyavinotha, D. Nibin, N. V. Cibin","doi":"10.23883/ijrter.conf.20190304.026.poksd","DOIUrl":null,"url":null,"abstract":"The privacy is a major concern in big data mining approach.Recent works in this field offer algorithms that not only localize the tampering, but also recover the original content in the lost area. The self-restoration problem can be modeled as a sourcechannel coding problem. The original image is compressed using an efficient source encoder. The output is then channel coded. At the receiver, decoder reveals the encoder output bit stream. The output of the source decoder is then used to replace the content of the tampered area. Watermarking the original images to protect them against tampering has recently attracted an overgrowing interest. The performance is significantly improved in terms of the quality of watermarked image, quality of the restored content, and tolerable tampering rate.","PeriodicalId":143099,"journal":{"name":"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Source Channel Coding Approach to Generate Tamper Proof Images\",\"authors\":\"D. Nishma, S. Jeyavinotha, D. Nibin, N. V. Cibin\",\"doi\":\"10.23883/ijrter.conf.20190304.026.poksd\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The privacy is a major concern in big data mining approach.Recent works in this field offer algorithms that not only localize the tampering, but also recover the original content in the lost area. The self-restoration problem can be modeled as a sourcechannel coding problem. The original image is compressed using an efficient source encoder. The output is then channel coded. At the receiver, decoder reveals the encoder output bit stream. The output of the source decoder is then used to replace the content of the tampered area. Watermarking the original images to protect them against tampering has recently attracted an overgrowing interest. The performance is significantly improved in terms of the quality of watermarked image, quality of the restored content, and tolerable tampering rate.\",\"PeriodicalId\":143099,\"journal\":{\"name\":\"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23883/ijrter.conf.20190304.026.poksd\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23883/ijrter.conf.20190304.026.poksd","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Source Channel Coding Approach to Generate Tamper Proof Images
The privacy is a major concern in big data mining approach.Recent works in this field offer algorithms that not only localize the tampering, but also recover the original content in the lost area. The self-restoration problem can be modeled as a sourcechannel coding problem. The original image is compressed using an efficient source encoder. The output is then channel coded. At the receiver, decoder reveals the encoder output bit stream. The output of the source decoder is then used to replace the content of the tampered area. Watermarking the original images to protect them against tampering has recently attracted an overgrowing interest. The performance is significantly improved in terms of the quality of watermarked image, quality of the restored content, and tolerable tampering rate.