{"title":"一种基于交叉检测技术的半色调图像检测新方法","authors":"Tung-Shou Chen, Jeanne Chen, Yu-Mei Pan","doi":"10.1109/MMSE.2003.1254427","DOIUrl":null,"url":null,"abstract":"The rapid advancement in digital technological is increasing demand for products with digital data functionality. Digital data are easily distorted or tampered with. Therefore, providing protection from distortions or to authenticate poses a great challenge to information security and image processing. We propose a crisscross checking technique for halftone images. The host image is divided into row and column blocks from which scrambled code-blocks will be generated. The MD5 and RSA algorithms will be applied to code-strings containing code-blocks to generate encrypted sign messages. These messages will be hidden in the blocks. During the detection process, the row and column blocks will be checked for these messages. A block will be marked as tampered when an error bit is located.","PeriodicalId":322357,"journal":{"name":"Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A new detection method of halftone images based on crisscross checking technique\",\"authors\":\"Tung-Shou Chen, Jeanne Chen, Yu-Mei Pan\",\"doi\":\"10.1109/MMSE.2003.1254427\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid advancement in digital technological is increasing demand for products with digital data functionality. Digital data are easily distorted or tampered with. Therefore, providing protection from distortions or to authenticate poses a great challenge to information security and image processing. We propose a crisscross checking technique for halftone images. The host image is divided into row and column blocks from which scrambled code-blocks will be generated. The MD5 and RSA algorithms will be applied to code-strings containing code-blocks to generate encrypted sign messages. These messages will be hidden in the blocks. During the detection process, the row and column blocks will be checked for these messages. A block will be marked as tampered when an error bit is located.\",\"PeriodicalId\":322357,\"journal\":{\"name\":\"Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings.\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MMSE.2003.1254427\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MMSE.2003.1254427","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new detection method of halftone images based on crisscross checking technique
The rapid advancement in digital technological is increasing demand for products with digital data functionality. Digital data are easily distorted or tampered with. Therefore, providing protection from distortions or to authenticate poses a great challenge to information security and image processing. We propose a crisscross checking technique for halftone images. The host image is divided into row and column blocks from which scrambled code-blocks will be generated. The MD5 and RSA algorithms will be applied to code-strings containing code-blocks to generate encrypted sign messages. These messages will be hidden in the blocks. During the detection process, the row and column blocks will be checked for these messages. A block will be marked as tampered when an error bit is located.