Yingdong Lu, Mark S. Squillante, et al.
IFIP WG 7.3 Performance 2015
We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.
Yingdong Lu, Mark S. Squillante, et al.
IFIP WG 7.3 Performance 2015
Chai Wah Wu
ISCAS 2020
Barry Trager, Chai Wah Wu, et al.
ISCAS 2011
Yixin Diao, Chai Wah Wu, et al.
ACC 2005