Chai Wah Wu
ISCAS 2005
We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.
Chai Wah Wu
ISCAS 2005
Alan J. Hoffman, Chai Wah Wu
American Mathematical Monthly
Dan Chevion, Ehud D. Karnin, et al.
TAGA 2004
Yingdong Lu, Mark S. Squillante, et al.
IFIP WG 7.3 Performance 2017