CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A content-based image authentication system with lossless data hiding
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
Approximate image message authentication codes
IEEE Transactions on Multimedia
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A secure and robust hash-based scheme for image authentication
Signal Processing
A hybrid content-based image authentication scheme
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
Hi-index | 0.00 |
In [1---3], we have briefly introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correction coding (ECC), watermarking and cryptographic signature into one unified framework. In this paper, we first study the difference between two types of distortions, namely incidental distortions which come from the defined acceptable content manipulations such as lossy compression, and intentional distortions which come from real attacks such as content copy-paste. We then introduce a new JPEG-compliant solution under our proposed framework but with different ECC and watermarking methods. Finally system performance evaluation and analysis will be given to further demonstrate the practicability of our method.