Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)Available to Purchase
ISBN:
9780791859735
No. of Pages:
970
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
11 A New Method for Self-Embedding Image Construction Available to Purchase
By
Ghafour Alipour
,
Ghafour Alipour
Islamic Azad University, Hashtroud Branch
; [email protected]
Search for other works by this author on:
Manouchehr Parsai
Page Count:
6
-
Published:2011
Citation
Alipour, G, & Parsai, M. "A New Method for Self-Embedding Image Construction." International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
In this paper, we introduce two algorithms for self-embedding an image into itself as a means for protecting the image content. After self-embedding, it is possible to recover portions of the image that have been cropped out, replaced, damaged, or otherwise tampered. The algorithms is based on transforming small 8×8 blocks using a DCT, quantizing the coefficients, and carefully encoding them in the least significant bits of other distant squares. This method provides a very high quality of reconstruction but it is very fragile.
Abstract
Key Words
1. Introduction
2. New Self-Embedding Algorithms
3. Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Detecting the Watermarked Image in Visual CAPTCHA Format and Getting Its Encrypted Information
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
A Novel Encryption Algorithm of Discrete Chaos Theory
International Symposium on Information Engineering and Electronic Commerce, 3rd (IEEC 2011)
An Effective Analysis of Multiobjective EAs for Bicriteria Communication Spanning Tree Problem
Intelligent Engineering Systems through Artificial Neural Networks, Volume 16
Rate-1∕2 Maximum Free Distance Convolutional Codes Complexity Analysis with Chaos-Encrypted Data
Intelligent Engineering Systems through Artificial Neural Networks Volume 18
Related Articles
A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing
J. Comput. Inf. Sci. Eng (August,2021)
Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment
J. Manuf. Sci. Eng (August,2015)
General Correlation of Building Energy Use Via Hybrid Genetic Programming/Genetic Algorithm
J. Sol. Energy Eng (August,2018)