Learn More
This paper presents a new model of the content reconstruction problem in self-embedding systems, based on an erasure communication channel. We explain why such a model is a good fit for this problem, and how it can be practically implemented with the use of digital fountain codes. The proposed method is based on an alternative approach to spreading the(More)
—The rapidly improving performance of modern hardware renders convolutional codes obsolete, and allows for the practical implementation of more sophisticated correction codes such as low density parity check (LDPC) and turbo codes (TC). Both are decoded by iterative algorithms, which require a disproportional computational effort for low channel noise. They(More)
This paper deals with the design of a self-embedding scheme for JPEG-compressed images. Most of existing schemes are compatible only with loss-less images. Few of them are capable of handling lossy compression, but deliver very low restoration fidelity, and support only small amounts of tampered content. In this study, we extend a recently proposed(More)
A sliding window-based analysis is a prevailing mechanism for tampering localization in passive image authentication. It uses existing forensic detectors, originally designed for a full-frame analysis, to obtain the detection scores for individual image regions. One of the main problems with a window-based analysis is its impractically low localization(More)
—This paper deals with the design of a practical self-recovery mechanism for lossy compressed JPEG images. We extend a recently proposed model of the content reconstruction problem based on digital fountain codes to take into account the impact of emerging watermark extraction and block classification errors. In contrast to existing methods, our scheme(More)