A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
Robust, short and sensitive authentication tags using secure sketch
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Unconditionally Secure Approximate Message Authentication
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Intrinsic sensor noise features for forensic analysis on scanners and scanned images
IEEE Transactions on Information Forensics and Security
A secure and robust hash-based scheme for image authentication
Signal Processing
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Approximate message authentication and biometric entity authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Witsenhausen's counterexample and its links with multimedia security problems
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.00 |
This paper introduces approximate image message authentication codes (IMACs) for soft image authentication. The proposed approximate IMAC survives small to moderate image compression and it is capable of detecting and locating tampering. Techniques such as block averaging and smoothing, parallel approximate message authentication code (AMAC) computation, and image histogram enhancement are used in the construction of the approximate IMAC. The performance of the approximate IMAC in three image modification scenarios, namely, JPEG compression, deliberate image tampering, and additive Gaussian noise, is studied and compared. Simulation results are presented