Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
On (In)security of "A Robust Image Authentication Method"
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
Invariant Image Watermarking Based on Local Feature Regions
CW '08 Proceedings of the 2008 International Conference on Cyberworlds
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
IEEE Transactions on Information Forensics and Security - Part 1
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Approximate image message authentication codes
IEEE Transactions on Multimedia
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Fault resilient and compression tolerant digital signature for image authentication
IEEE Transactions on Consumer Electronics
The trustworthy digital camera: restoring credibility to the photographic image
IEEE Transactions on Consumer Electronics
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
On the security of the digest function in the SARI image authentication system
IEEE Transactions on Circuits and Systems for Video Technology
Cryptanalysis on an image scrambling encryption scheme based on pixel bit
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Robust image hash in Radon transform domain for authentication
Image Communication
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
Robust 3D mesh model hashing based on feature object
Digital Signal Processing
Perceptual image hashing via wave atom transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Digital Image Protection using Keyed Hash Function
International Journal of Computer Vision and Image Processing
Fast communication: Robust image hashing using ring-based entropies
Signal Processing
Content-based copy detection through multimodal feature representation and temporal pyramid matching
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.08 |
To authenticate an image using a hash function is a challenging task since several core issues like tamper detection, security and robustness needs to be addressed. In this paper, we propose a hash-based image authentication scheme that simultaneously attempts to address these core issues. Unlike most of the existing schemes that use secret key in the feature extraction stage, we use secret key to randomly modulate image pixels to create a transformed feature space. The key-dependent transformed feature space is then used to calculate the image hash. To reduce the size of the hash, a 4-bit quantization scheme is also proposed. The experimental results reported in this paper reveals that the proposed scheme offers good robustness against JPEG compression, low-pass and high-pass filtering. Besides being robust, the proposed hashing scheme can detect minute tampering with localization of the tampered area. These results along with the receiver operating curve (ROC) and security analysis presented in this work makes the proposed technique a candidate for practical digital image signature systems where the transmitted or stored image might undergo JPEG compression, low-pass or high-pass filtering.