A Computational Approach to Edge Detection
IEEE Transactions on Pattern Analysis and Machine Intelligence
SUSAN—A New Approach to Low Level Image Processing
International Journal of Computer Vision
Evaluation of Interest Point Detectors
International Journal of Computer Vision - Special issue on a special section on visual surveillance
Scale-Space Theory in Computer Vision
Scale-Space Theory in Computer Vision
New Iterative Geometric Methods for Robust Perceptual Image Hashing
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Towards automatic visual obstacle avoidance
IJCAI'77 Proceedings of the 5th international joint conference on Artificial intelligence - Volume 2
IEEE Spectrum
Content-based image authentication: current status, issues, and challenges
International Journal of Information Security
A secure and robust hash-based scheme for image authentication
Signal Processing
Content based image hashing via wavelet and radon transform
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Compact and robust image hashing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A clustering based approach to perceptual image hashing
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
A novel image forensic approach for content authenticity analysis is proposed. We call it forensic signature. It is a compact and scalable representation generated by proper selecting robust features from the original image. In the proposed method, adaptive Harris corner detection algorithm is used to extract image feature points, then the statistics of feature point neighborhood are used to construct forensic signature. This forensic signature can provide evidence for analyzing the processed history of the received image at a lower computational cost, including geometric transform estimation, tampering detection and tampering localization. The characteristics of the proposed method are: (1) It provides a novel forensics analysis tool for tracing the processed history of the image. (2) It achieves a trade-off between robustness against content-preserving manipulations and sensitivity for the changes caused by malicious attacks. (3) By using Fisher criterion, it provides an adaptive method to generate the signature matching threshold value. (4) It can detect subtle changes in texture and color. Experimental results show that proposed method is robust for content-preserving manipulations such as JPEG compression, adding noise, and filtering, etc., and it is also capable to trace the processed history of the received image.