Open Access
Subscription Access
Open Access
Subscription Access
A Lossless Compression Technique with Forgery Detection
Subscribe/Renew Journal
Today images are widely used for the authentication purposes. For example in digital watermarking, visual cryptography etc, we use images for the authentication. Here images are transmitted from sender to receiver through a communication network, where they are processed for ensuring the authentication. While transmitting the images we must ensure that it is compressed effectively without losing the quality of image. Another threat while sending the image through network is that, it can be accessed and modified by a third party easily. This will affect the integrity of the image and it cannot be used for the authentication purposes. For ensuring a better usage of image for authentication purposes our approach uses the JPEG LS compression technique, which provides a better compression rate and good visual quality. For checking the integrity of image here the JPEG Ghost technique is used.
Keywords
Compression, Digital Forgeries, JPEG Compression, JPEG Ghost, JPEG LS.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 229
PDF Views: 3