Structural digital signature for image authentication: an incidental distortion resistant scheme
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Digital watermarking in the fractional Fourier transformation domain
Journal of Network and Computer Applications
Fast image indexing based on JPEG2000 packet header
MULTIMEDIA '01 Proceedings of the 2001 ACM workshops on Multimedia: multimedia information retrieval
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
New Iterative Geometric Methods for Robust Perceptual Image Hashing
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Protection of wavelet-based watermarking systems using filter parametrization
Signal Processing - Special section: Security of data hiding technologies
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
JPEG2000 and Motion JPEG2000 Content Analysis Using Codestream Length Information
DCC '05 Proceedings of the Data Compression Conference
Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Robustness and security of a wavelet-based CBIR hashing algorithm
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Perceptual audio hashing functions
EURASIP Journal on Applied Signal Processing
WAMUS'07 Proceedings of the 7th WSEAS international conference on Wavelet analysis & multirate systems
Security enhancement of visual hashes through key dependent wavelet transformations
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Unicity Distance of Robust Image Hashing
IEEE Transactions on Information Forensics and Security - Part 1
A clustering based approach to perceptual image hashing
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A novel image hash algorithm resistant to print-scan
Signal Processing
Non-invertible and revocable iris templates using key-dependent wavelet transforms
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
We discuss a robust image authentication scheme based on a hash string constructed from leading JPEG2000 packet data. Motivated by attacks against the approach, key-dependency is added by means of employing a parameterized lifting scheme in the wavelet decomposition stage. Attacks can be prevented effectively in this manner and the security of the scheme in terms of unicity distance is assumed to be high. Key-dependency however can lead to reduced sensitivity of the scheme. This effect has to be compensated by an increase of the hash length which in turn decreases robustness.