Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
Approximate image message authentication codes
IEEE Transactions on Multimedia
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
On the security of the digest function in the SARI image authentication system
IEEE Transactions on Circuits and Systems for Video Technology
A secure and robust hash-based scheme for image authentication
Signal Processing
Hi-index | 0.00 |
The purpose of an image hash is to provide a compact representation of the whole image. Designing a good image hash function requires careful consideration of many issues such as robustness, security and tamper detection with precise localization. In this paper, we present a novel hashing scheme that addresses these issues in a unified framework. We analyze the security issues in image hashing and present new ideas to counter some of the attacks that we shall describe in this paper. Our proposed scheme is resilient to allow non-malicious manipulations like JPEG compression, high pass filtering and is sensitive enough to detect tampering with precise localization. Several experimental results are presented to demonstrate the effectiveness of the proposed scheme.