Using Cryptographic and Watermarking Algorithms
IEEE MultiMedia
Detecting and restoring the tampered images based on iteration-free fractal compression
Journal of Systems and Software
Geometric distortion-resilient image hashing system and its application scalability
Proceedings of the 2004 workshop on Multimedia and security
Multimedia authentication with sensor-based watermarking
Proceedings of the 2004 workshop on Multimedia and security
Multiple embedding using robust watermarks for wireless medical images
Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia
Image authentication based on digital signature and semi-fragile watermarking
Journal of Computer Science and Technology
SSF fingerprint for image authentication: an incidental distortion resistant scheme
Proceedings of the 13th annual ACM international conference on Multimedia
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
An efficient image authentication method based on Hamming code
Pattern Recognition
Image authentication using added signal-dependent noise
Research Letters in Signal Processing
Integrity assessment of diagnostic image content
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval
Textural features extraction for image integrity verification
International Journal of Electronic Security and Digital Forensics
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Secure and incidental distortion tolerant digital signature for image authentication
Journal of Computer Science and Technology
Multimedia Tools and Applications
Unconditionally Secure Approximate Message Authentication
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Recover the tampered image based on VQ indexing
Signal Processing
A hypothesis testing approach to semifragile watermark-based authentication
IEEE Transactions on Information Forensics and Security
Performance analysis of Fridrich-Goljan self-embedding authentication method
IEEE Transactions on Information Forensics and Security
Improving the robustness of DCT-based image watermarking against JPEG compression
Computer Standards & Interfaces
Image Authentication Scheme Based on Self-embedding Watermarking
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A secure and robust hash-based scheme for image authentication
Signal Processing
A novel CRT-based watermarking technique for authentication of multimedia contents
Digital Signal Processing
Statistics- and spatiality-based feature distance measure for error resilient image authentication
Transactions on data hiding and multimedia security II
Fragility analysis of adaptive quantization-based image hashing
IEEE Transactions on Information Forensics and Security
A hybrid content-based image authentication scheme
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Secure image hashing VIA minimum distortion estimation
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
Digital Signal Processing
Nonblind and quasiblind natural preserve transform watermarking
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
A quantization-based semi-fragile watermarking scheme for image content authentication
Journal of Visual Communication and Image Representation
Lexicographical framework for image hashing with implementation based on DCT and NMF
Multimedia Tools and Applications
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection
Fundamenta Informaticae
Random Gray code and its performance analysis for image hashing
Signal Processing
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Robust image hash in Radon transform domain for authentication
Image Communication
A novel watermarking scheme for H.264/AVC video authentication
Image Communication
A multi-purpose digital image watermarking using fractal block coding
Journal of Systems and Software
A secure fragile watermarking scheme based on chaos-and-hamming code
Journal of Systems and Software
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Digital image authentication based on error-correction codes
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Compact and robust image hashing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Fragile watermarking scheme for accepting image compression
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Compact and robust fingerprints using DCT coefficients of key blocks
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part II
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
Journal of Visual Communication and Image Representation
Error resilient image authentication using feature statistical and spatial properties
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Image forensic signature for content authenticity analysis
Journal of Visual Communication and Image Representation
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
Perceptual image hashing via wave atom transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Secure image authentication by distibuted source coding using LDPC encoding
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Digital Image Authentication: A Review
International Journal of Digital Library Systems
Perceptual image hashing with histogram of color vector angles
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Memoryless hash-based perceptual image authentication
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Content-based copy detection through multimodal feature representation and temporal pyramid matching
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.00 |
Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. The authentication signature is based on the invariance of the relationships between discrete cosine transform (DCT) coefficients at the same position in separate blocks of an image. These relationships are preserved when DCT coefficients are quantized in JPEG compression. Our proposed method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. We describe adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling. We also present theoretical and experimental results to demonstrate the effectiveness of the technique