A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
An efficient image authentication method based on Hamming code
Pattern Recognition
Fast VQ codebook search algorithm for grayscale image coding
Image and Vision Computing
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
Dual watermark for image tamper detection and recovery
Pattern Recognition
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Fast VQ Codebook Generation Method Using Codeword Stability Check and Finite State Concept
Fundamenta Informaticae
Recover the tampered image based on VQ indexing
Signal Processing
A secure and robust hash-based scheme for image authentication
Signal Processing
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
Digital Signal Processing
A quantization-based semi-fragile watermarking scheme for image content authentication
Journal of Visual Communication and Image Representation
IEEE Transactions on Information Forensics and Security
Approximate image message authentication codes
IEEE Transactions on Multimedia
A fast LBG codebook training algorithm for vector quantization
IEEE Transactions on Consumer Electronics
Fault resilient and compression tolerant digital signature for image authentication
IEEE Transactions on Consumer Electronics
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper proposes an image authentication scheme which detects illegal modifications for image vector quantization (VQ). In the proposed scheme, the index table is divided into non-overlapping index blocks. The authentication data is generated by using the pseudo random sequence. Our scheme can adaptively determine both the size of the authentication data and the number of the indices in each index block. Then, the selected indices are used to embed the secret data to generate the embedded image. To authenticate the given VQ compressed image, two sets of the authentication data are needed to perform the tamper detection process. One set is generated by using the pseudo random number sequence. The other set is extracted from the compressed image. The experimental results demonstrate that the proposed scheme achieves acceptable image quality of the embedded image while keeping good detecting accuracy.