Texture descriptors based on co-occurrence matrices
Computer Vision, Graphics, and Image Processing
Structural digital signature for image authentication: an incidental distortion resistant scheme
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Automatic texture segmentation for content-based image retrieval application
Pattern Analysis & Applications
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
A secure and robust digital signature scheme for JPEG2000 image authentication
IEEE Transactions on Multimedia
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Soft authentication intends to distinguish specific acceptable image manipulations from malicious ones. In this article, we propose a soft authentication scheme based on texture features and digital signature. It can detect and locate malicious manipulations made to individual image blocks, and verify the integrity of the overall image. It makes use of the invariance of second-order statistics on adjacent pixels to geometric transformations which are generally considered as content preserving modifications. A set of characteristics are extracted from each block, then processed to form a hash to be embedded in an other distant block. Furthermore, a cryptographic digital signature is incrementally formed, in a CBC manner to render the scheme resistant to content cutting and pasting attacks. Experimental results show the efficiency of the proposed scheme.