{"title":"An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network","authors":"Jau-Ji Shen, Chin-Feng Lee, Chin-Ting Yeh, Somya Agrawal","doi":"10.1145/3404709.3404763","DOIUrl":null,"url":null,"abstract":"In the past, there has been a lot of research in the development of digital watermark technology in image authentication. In this paper, we will propose a Deep Convolutional Generative Adversarial Network (DCGAN) architecture extended by the Generative Adversarial Network (GAN) to conduct training and verification evaluation through three subnets. Try to use a deep learning-based architecture for image authentication. Through the training of the model, the features of the authentication image can be more accurately extracted and the tampered local features can be found too.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3404709.3404763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the past, there has been a lot of research in the development of digital watermark technology in image authentication. In this paper, we will propose a Deep Convolutional Generative Adversarial Network (DCGAN) architecture extended by the Generative Adversarial Network (GAN) to conduct training and verification evaluation through three subnets. Try to use a deep learning-based architecture for image authentication. Through the training of the model, the features of the authentication image can be more accurately extracted and the tampered local features can be found too.