Image watermaking for owner and content authentication
MULTIMEDIA '00 Proceedings of the eighth ACM international conference on Multimedia
SARI: self-authentication-and-recovery image watermarking system
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Rotation, Translation and Scale Invariant Digital Image Watermarking
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Robust Bit Extraction from Images
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
JPEG2000-based secure image authentication
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Dual watermarking for protection of rightful ownership and secure image authentication
Proceedings of the 4th ACM international workshop on Contents protection and security
A majority-voting based watermarking scheme for color image tamper detection and recovery
Computer Standards & Interfaces
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Iterative compensation schemes for multimedia content authentication
Journal of Visual Communication and Image Representation
A visible watermarking algorithm based on the content and contrast aware (COCOA) technique
Journal of Visual Communication and Image Representation
Using noise inconsistencies for blind image forensics
Image and Vision Computing
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
Secure peer-to-peer 3D streaming
Multimedia Tools and Applications
A Survey of Passive Image Tampering Detection
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Compensated Signature Embedding for Multimedia Content Authentication
Journal of Data and Information Quality (JDIQ)
Gaussian scale-space features for semi-fragile image authentication
PCS'09 Proceedings of the 27th conference on Picture Coding Symposium
RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Digital Image Forensics Using EM Algorithm
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Content-adaptive semi-fragile image authentication based on JPEG2000 compression
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Effective image splicing detection based on image chroma
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A bibliography on blind methods for identifying image forgery
Image Communication
A novel pixel based blind watermarking algorithm by applying Fibonacci transform
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A method for trust management in cloud computing: Data coloring by cloud watermarking
International Journal of Automation and Computing
Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Digital image authentication based on error-correction codes
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Digital image splicing detection based on Markov features in DCT and DWT domain
Pattern Recognition
Stationary wavelet transform based audio authentication technique
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
Image and Vision Computing
Decomposed PRNU Library for Forensics on Photos
International Journal of Digital Library Systems
Digital Image Authentication: A Review
International Journal of Digital Library Systems
A Survey of Digital Forensic Techniques for Digital Libraries
International Journal of Digital Library Systems
Hi-index | 0.00 |
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.