Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Error Control Coding, Second Edition
Error Control Coding, Second Edition
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
A Novel Image Hashing Scheme Based on Wave Atoms
IIH-MSP '11 Proceedings of the 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Robust and Secure Image Hashing via Non-Negative Matrix Factorizations
IEEE Transactions on Information Forensics and Security - Part 1
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
IEEE Transactions on Multimedia
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
It is well known that the rapid development of multimedia technologies has led to a huge growth of image editing tools. The popularity of image editing tools has further resulted in the growth of image illegal utilization. Unlike the traditional information authentication, perceptual image hashing approaches are recently proposed for content-based image authentication, which can distinguish maliciously altered images from the perceptually identical ones. However, these approaches need some other information to achieve the authentication, such as the hash codes of original images. Semi-fragile watermarking is also presented to deal with content-based authentication; however this approach focuses more on some specific aspect of robustness, for example JEPG compression. Hence, to avoid extra information storage and simultaneously achieve a global robustness against common image processing manipulations, this paper presents a memoryless hash-based perceptual image authentication algorithm using joint image hashing and watermarking method upon wave atom transform. Experimental results have demonstrated that the proposed algorithm possesses great robustness against common non-malicious manipulations and still keeps high sensitivity to malicious attacks. It can also provide perceptual image authentication successfully without any other information, even the hash codes of original images.