12,662 Hits in 4.2 sec

Robust image authentication using content based compression

Ee-Chien Chang, Mohan S. Kankanhalli, Xin Guan, Zhiyong Huang, Yinghui Wu
2003 Multimedia Systems  
To exploit this observation, we propose an image authentication scheme where the signature is the result of an extremely low-bit-rate content-based compression.  ...  The content-based compression is guided by a space-variant weighting function whose values are higher in the more important and sensitive region.  ...  The authors would like to thank the referees for the very insightful review comments that have substantially improved the content of this paper.  ... 
doi:10.1007/s00530-003-0083-6 fatcat:2tljuvcqofc2jkpe5m3zdbn6aq

Methods for image authentication: a survey

Adil Haouzia, Rita Noumeir
2007 Multimedia tools and applications  
These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content.  ...  Furthermore, we introduce the concept of image content and discuss the most important requirements for an effective image authentication system design.  ...  Generic diagram of an authentication system based on image content Image authentication systems that use a digital signature based on the semantic content of images could be described in a generic diagram  ... 
doi:10.1007/s11042-007-0154-3 fatcat:wwtvlpeyjnck3pj5gcpxakvhfq

Implementation of Technique for Image Authentication using Regular LDPC Codes

Imran AliKhan, Bhanu Pratap Singh Sengar
2013 International Journal of Computer Applications  
We proposed an approach using encryption and LDPC source coding for the image authentication problem.  ...  Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original image might exist.  ...  Many hash-based image authentication systems achieve robustness against lossy compression by using compressioninvariant features, such as [14] [15] .  ... 
doi:10.5120/11383-6662 fatcat:h3epovwi2zgkjenhonqzhlxjpu

Image Authentication by Content Preserving Robust Image Hashing Using Local and Global Features

Lima S. Sebastian, Abraham Varghese, T. Manesh
2015 Procedia Computer Science  
The method detects image forgery and locates the forged regions of the image. The proposed hash is robust to common content preserving modifications and sensitive to malicious manipulations.  ...  Image hashing technique constructs a short sequence from the image to represent its contents.  ...  Many methods have been proposed for image authentication, among which authentication by robust image hashing is the newest and widely used authentication technique.  ... 
doi:10.1016/j.procs.2015.02.081 fatcat:c7oxydftojehlnp2s6za4eqdsy

A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization

Xiaojun Qi, Xing Xin
2015 Journal of Visual Communication and Image Representation  
presents a singular-value-based semi-fragile watermarking scheme for image content authentication.  ...  It then constructs error maps to compute five authentication measures and performs a three-level process to authenticate image content and localize tampered areas.  ...  Here, content-dependent watermark is a robust signature extracted by SV-based features and content-independent watermark is a private-key-based random watermark.  ... 
doi:10.1016/j.jvcir.2015.05.006 fatcat:tpv6ircgbvblzisdy6iznfceoq

Gaussian scale-space features for semi-fragile image authentication

Mathias Schlauweg, Erika Muller
2009 2009 Picture Coding Symposium  
In this paper, we propose a new robust image hashing approach to be used for semi-fragile image authentication.  ...  It is associated with the image content and thus independent of image geometry.  ...  CONCLUSION This paper presents a new robust image content hashing approach for semi-fragile image authentication.  ... 
doi:10.1109/pcs.2009.5167462 dblp:conf/pcs/SchlauwegM09 fatcat:pg4at6svxzd6flzdm7zbnrscje

Watermark-Based Authentication [chapter]

Angela D'Angelo, Giacomo Cancelli, Mauro Barni
2010 Studies in Computational Intelligence  
Thus the validity of the system in authenticating images can not be checked. Another way to provide robust authentication, is by using methods based on feature-based watermark.  ...  watermarking methods guarantee content-based authentication.  ... 
doi:10.1007/978-3-642-11756-5_16 fatcat:rxlbydycbrfzhpa3sa5ycukaq4

Dual watermarking for protection of rightful ownership and secure image authentication

Mathias Schlauweg, Dima Pröfrock, Benedikt Zeibich, Erika Müller
2006 Proceedings of the 4th ACM international workshop on Contents protection and security - MCPS '06  
This second watermarking scheme is used for an efficient JPEG2000-based image authentication, which is robust to JPEG compression and other allowed signal processing operations.  ...  A digital watermarking approach highly robust to lossy image compression is presented.  ...  DIGITAL WATERMARKING IN THE COMPRESSION DOMAIN USED FOR SECURE IMAGE AUTHENTICATION Since the geometric warping watermarking approach using the proposed NCG statistic turns out to be robust to compression  ... 
doi:10.1145/1178766.1178781 fatcat:5vnuvwlsbzdhjncqqc2pogfvza

Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Archana Tiwari, Manisha Sharma
2012 Journal of Information Security  
To protect authenticity of images semifragile watermarking is very concerned by researchers because of its important function in multimedia content authentication.  ...  The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking.  ...  such as image compression.  Some methods use threshold to decide about image authenticity.  ... 
doi:10.4236/jis.2012.33023 fatcat:eppi6bojjzeolliypmn4u3a6uq

A Survey on Image Authentication Techniques

S. Jothimani, P. Betty
2014 International Journal of Engineering Trends and Technoloy  
Besides, image authentication system requires the main content sensitive.  ...  The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication.  ...  A robust and secure image hashes using Zernike moments, is based on rotation invariance of magnitudes.  ... 
doi:10.14445/22315381/ijett-v7p271 fatcat:gu4iusl6xnbq5o33dfbcor5cwu

Improved Protection Using Self-Recognized Image

Sanchit Shrikant Mahajan, Prof. Pratima Bhati
2015 International Journal of Innovative Research in Computer and Communication Engineering  
For evaluating the watermarking methods performance it must be concentrate on the robustness of watermarked image quality and restored image quality.  ...  So a digital watermarking can be used to protect the copyright of digital products. In such processes it is needed to maintain the original view of the host image.  ...  ., proposed a new digital signature scheme which makes use of an images contents to construct a structural digital signature for image authentication.  ... 
doi:10.15680/ijircce.2015.0301001 fatcat:yc5swpcfzbcmdbkbhoc3d72ywi

Multimedia Authentication and Watermarking [chapter]

Bin B. Zhu, Mitchell D. Swanson
2003 Signals and Communication Technology  
This is followed in Section 7.3 with detailed descriptions of the current algorithms for the three types of multimedia authentication: hard or complete authentication, soft authentication, and content-based  ...  The receiver R uses the sender's public key to decrypt the digital signature to obtain the original hash value, which is compared with the hash value calculated from the received message M.  ...  image for content-based authentication.  ... 
doi:10.1007/978-3-662-05300-3_7 fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i

A Novel Approach for Robust Perceptual Image Hashing

Azhar Hadmi, Awatif Rouijel
2021 Computer and Information Science  
In this paper, we propose a novel approach to improve robustness for perceptual image hashing scheme for generating a perceptual hash that should be resistant to content-preserving manipulations, such  ...  Next, robust features are suitably quantized allowing the generation of the final perceptual hash using the cryptographic hash function SHA1.  ...  Hauptmann, 2012; Song, Yang, Li, Huang, & Yang, 2014) , others are hash methods used for image content authentication (Li, Lu, Zhu, & Niu, 2012; Lv & Wang, 2012; Zhao, Wang, Zhang, & Yao, 2013; Lin,  ... 
doi:10.5539/cis.v14n3p38 fatcat:telpeh77lbhdhjq3f3txgqrenm

Watermarking-based image authentication with recovery capability using halftoning technique

Luis Rosales-Roldan, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Hector Perez-Meana, Brian Kurkoski
2013 Signal processing. Image communication  
In this paper we present a watermarking algorithm for image content authentication with localization and recovery capability of the modified areas.  ...  Due to the fact that the watermark is embedded into the sub-band LL of IWT, the proposed method is robust to JPEG compression.  ...  Consequently, content authentication scheme must be robust to content-preserving modification, such as JPEG compression.  ... 
doi:10.1016/j.image.2012.11.006 fatcat:3nty2r2hgvdhfeobtgsae2xcqe


Ching-Yung Lin, Shih-Fu Chang
2001 Proceedings of the ninth ACM international conference on Multimedia - MULTIMEDIA '01  
In this project, we designed a novel image authentication system based on our semi-fragile watermarking technique.  ...  The system, called SARI, can accept quantization-based lossy compression to a determined degree without any false alarm and can sensitively detect and locate malicious manipulations.  ...  and SARI Digital Signature SARI Characteristic Single-stage authentication End-to-end, content- based authentication Robustness No single bit of the data can be changed Accept various content-preserving  ... 
doi:10.1145/500141.500266 fatcat:jrn7xadqgjdfnnctkov32t4kam
« Previous Showing results 1 — 15 out of 12,662 results