- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- 【Updated on June 30, 2025】Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
An Approach to Video Coding Using Parameter Estimation in the Decoding Process
Description
In this paper, a novel image authentication scheme is proposed based on Sudoku puzzle. The goal of this scheme is to verify the integrity of an image against network attackers with malice. Sudoku is a logic-based combinatorial number-placement puzzle. Sudoku rule as its name means that the digits must be single. Here, it is used to be the verification code, instead of material watermarks, for the image. In this way the message receiver will not hold the verification code or watermarks when in the tampering detection. He or she only needs to examine the validity of the Sudoku grid. Simulation results showed that the proposed scheme can detect any an alteration and accurately mark where the tampered regions are.
Journal
-
- 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
-
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 1346-1349, 2009-09-01
IEEE