Geometric distortion-resilient image hashing system and its application scalability
Proceedings of the 2004 workshop on Multimedia and security
SSF fingerprint for image authentication: an incidental distortion resistant scheme
Proceedings of the 13th annual ACM international conference on Multimedia
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
An efficient image authentication method based on Hamming code
Pattern Recognition
Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Textural features extraction for image integrity verification
International Journal of Electronic Security and Digital Forensics
An effective method for detecting dental diseases by using fast neural networks
SSIP'08 Proceedings of the 8th conference on Signal, Speech and image processing
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Secure and incidental distortion tolerant digital signature for image authentication
Journal of Computer Science and Technology
Multimedia Tools and Applications
Power-rate-distortion model for low-complexity video coding
PCS'09 Proceedings of the 27th conference on Picture Coding Symposium
Image Authentication Scheme Based on Self-embedding Watermarking
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A secure and robust hash-based scheme for image authentication
Signal Processing
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
A novel PCA-based authentication watermarking scheme with superior localization and security
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Image authentication based on DCT with recovery capability
ACS'10 Proceedings of the 10th WSEAS international conference on Applied computer science
Passive detection of paint-doctored JPEG images
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Random Gray code and its performance analysis for image hashing
Signal Processing
Robust image hash in Radon transform domain for authentication
Image Communication
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Compact and robust image hashing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A bandwidth efficiency of lempel-ziv scheme for data authentication
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Low-complexity video coding via power-rate-distortion optimization
Journal of Visual Communication and Image Representation
A semi-fragile watermarking scheme based on SVD and VQ techniques
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
Perceptual image hashing via wave atom transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Secure image authentication by distibuted source coding using LDPC encoding
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Proceedings of the 20th ACM international conference on Multimedia
A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
Image and Vision Computing
Digital Image Authentication: A Review
International Journal of Digital Library Systems
Region duplication detection based on Harris corner points and step sector statistics
Journal of Visual Communication and Image Representation
Memoryless hash-based perceptual image authentication
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. The characteristic of the SDS is that it can tolerate content-preserving modifications while detecting content-changing modifications. Many incidental manipulations, which were detected as malicious modifications in the previous digital signature verification or fragile watermarking schemes, can be bypassed in the proposed scheme. Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication.