Detecting and restoring the tampered images based on iteration-free fractal compression
Journal of Systems and Software
Audio watermarking algorithm for real-time speech integrity and authentication
Proceedings of the 2004 workshop on Multimedia and security
SSF fingerprint for image authentication: an incidental distortion resistant scheme
Proceedings of the 13th annual ACM international conference on Multimedia
An efficient image authentication method based on Hamming code
Pattern Recognition
A new technique for authentication of image/video for multimedia applications
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Feature Extraction using Unit-linking Pulse Coupled Neural Network and its Applications
Neural Processing Letters
Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
Video authentication for H.264/AVC using digital signature standard and secure hash algorithm
Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video
Methods for image authentication: a survey
Multimedia Tools and Applications
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
Secure and incidental distortion tolerant digital signature for image authentication
Journal of Computer Science and Technology
Image Authentication Scheme Based on Self-embedding Watermarking
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
A secure and robust hash-based scheme for image authentication
Signal Processing
A novel PCA-based authentication watermarking scheme with superior localization and security
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Compact and robust image hashing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Compact and robust fingerprints using DCT coefficients of key blocks
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part II
A semi-fragile watermarking scheme based on SVD and VQ techniques
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.43 |
Many watermarking schemes have been proposed to protect the authority of the image producer. These schemes can help the image producer to assert the ownership when their images are illegal reproduced. A buyer may want to make sure that the received commodity is from the legal sender and prove its integrity. In this situation, digital signature schemes can meet these requirements. In this sender-receiver protocol, images are always compressed before transmission. So compression tolerant image-features have to be designed to replace the hash functions in conventional digital signature schemes. In this paper, a public-key based fault resilient and compression tolerant digital signature is proposed. The proposed method can not only verify the authenticity and the integrity of commodities, but also can locate the illegal modifications. Furthermore, the proposed method can provide the capability of recovery if images are tampered