Protection of wavelet-based watermarking systems using filter parametrization
Signal Processing - Special section: Security of data hiding technologies
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Image authentication has applications in security systems, photo forensics, and photo journalism. This paper presents an image authentication scheme using added signal-dependent noise. Imperceptible noise is embedded into the image at the time of acquisition according to the film grain noise model. During authentication, the image is divided into key-dependent overlapping blocks and the parameters of the embedded noise are extracted. The variance of the extracted parameters can be used to show the authenticity of an image. Test results indicate that the proposed algorithm is robust against content-preserving modifications such as JPEG compression and at the same time is capable of detecting malicious tampering.