Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Digital Image Tamper Detection and Recovery by grouping Most Significant Bits


Affiliations
1 Malla Reddy College of Engineering & Technology, Secunderabad, India
     

   Subscribe/Renew Journal


Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged (in 2011) [6]. Due to this rearrangement, the value of the most-significant bit of each tampered pixel can be determined according to its parity check bits. With the help of the most-significant bit of the pixel, the pixel can be recovered by selecting two possible (7, 4) Hamming code words. However, if the distance between two Hamming code words is within a certain range, incorrect selection may occur. Chan’s method added one additional bit to indicate the correct one. It is trivial that this may degrade the quality of the authenticated image. This paper groups four most-significant bits into different groups to form a mapping code book and the mapping code book is used to produce authentication data instead of the (7, 4) Hamming code book. The experimental results show that the proposed method has a greater ability to recover tampered areas.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 389

PDF Views: 2




  • A Novel Digital Image Tamper Detection and Recovery by grouping Most Significant Bits

Abstract Views: 389  |  PDF Views: 2

Authors

B. Vijay Kumar
Malla Reddy College of Engineering & Technology, Secunderabad, India

Abstract


Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged (in 2011) [6]. Due to this rearrangement, the value of the most-significant bit of each tampered pixel can be determined according to its parity check bits. With the help of the most-significant bit of the pixel, the pixel can be recovered by selecting two possible (7, 4) Hamming code words. However, if the distance between two Hamming code words is within a certain range, incorrect selection may occur. Chan’s method added one additional bit to indicate the correct one. It is trivial that this may degrade the quality of the authenticated image. This paper groups four most-significant bits into different groups to form a mapping code book and the mapping code book is used to produce authentication data instead of the (7, 4) Hamming code book. The experimental results show that the proposed method has a greater ability to recover tampered areas.