Cocktail Watermarking on Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Multipurpose Audio Watermarking
ICPR '00 Proceedings of the International Conference on Pattern Recognition - Volume 3
A new, fast, and efficient image codec based on set partitioning in hierarchical trees
IEEE Transactions on Circuits and Systems for Video Technology
Detecting and restoring the tampered images based on iteration-free fractal compression
Journal of Systems and Software
Robustness and security of a wavelet-based CBIR hashing algorithm
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A new technique for authentication of image/video for multimedia applications
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Methods for image authentication: a survey
Multimedia Tools and Applications
Key-dependent JPEG2000-based robust hashing for secure image authentication
EURASIP Journal on Information Security
Textural features extraction for image integrity verification
International Journal of Electronic Security and Digital Forensics
A bibliography on blind methods for identifying image forgery
Image Communication
Fragile watermarking scheme for accepting image compression
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Hi-index | 0.00 |
The existing digital data authentication methods are able to detect tampered regions, but are too fragile to resist incidental distortions. This paper will present a new digital signature scheme for image authentication by making use of image content (in the wavelet domain). Based on this concept, a structural digital signature (SDS) is constructed. SDS is a signature that can be used to judge whether an incoming modification is incidental or malicious. When the structure of an SDS is maintained near-complete, we classify the incoming modification as incidental; otherwise, it is malicious. Many incidental manipulations, which cannot be tolerated in previous digital signature or fragile watermarking methods, can now survive under the proposed scheme.