Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2010)
A secure and robust hash-based scheme for image authentication. Signal Process
Chun-Shien Lu, H. Liao (2000)
Structural digital signature for image authentication: an incidental distortion resistant schemeIEEE Trans. Multim., 5
J. Fridrich (2000)
Robust hash functions for digital watermarkingProceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)
Ching-Yung Lin, Shih-Fu Chang (2001)
A robust image authentication method distinguishing JPEG compression from malicious manipulationIEEE Trans. Circuits Syst. Video Technol., 11
Marc Schneider, Shih-Fu Chang (1996)
A robust content based digital signature for image authenticationProceedings of 3rd IEEE International Conference on Image Processing, 3
(2007)
Secure and robust image perceptual hashing
A. Swaminathan, Yinian Mao, Min Wu (2006)
Robust and secure image hashingIEEE Transactions on Information Forensics and Security, 1
X. Guo, D. Hatzinakos (2007)
Content Based Image Hashing Via Wavelet and Radon Transform
Yongdong Zhang, Sheng Tang, Jintao Li (2007)
Secure and Incidental Distortion Tolerant Digital Signature for Image AuthenticationJournal of Computer Science and Technology, 22
(2006)
Research on multimedia digital signature techniques
Hyung-Myong Kim, Heung-Kyu Lee (2003)
Invariant image watermark using Zernike momentsIEEE Trans. Circuits Syst. Video Technol., 13
M. Bhuyan, D. Bhattacharyya, Hossein Homaei, H. Shahriari, J. Hu, Yong Yu, Y. Mu, Guilin Wang, Ying Sun, H. Asghar, J. Pieprzyk, Huaxiong Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Lan Zhou, V. Varadharajan, M. Hitchens, L. Harn, C. Lee, Chang-Tay Lin, Chinchen Chang, Yini Wang, Sheng Wen, Silvio Cesare, Erika Rosas, O. Marin, Xavier Bonnaire (1958)
The Computer JournalNature, 181
Sheng Tang, Jintao Li, Yongdong Zhang (2005)
Compact and Robust Image Hashing
F. Ahmed, M. Siyal (2007)
A Secure and Robust Wavelet-Based Hashing Scheme for Image Authentication
(2007)
Performance evaluation for content-based image authentication
Michael Calonder, V. Lepetit, P. Fua, K. Konolige, James Bowman, P. Mihelich (2009)
Compact signatures for high-speed interest point description and matching2009 IEEE 12th International Conference on Computer Vision
A. Swaminathan, Yinian Mao, Min Wu (2005)
Security of feature extraction in image hashingProceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., 2
V. Monga, B. Evans (2006)
Perceptual Image Hashing Via Feature Points: Performance Evaluation and TradeoffsIEEE Transactions on Image Processing, 15
D. Lou, Jiang-Lung Liu (2000)
Fault resilient and compression tolerant digital signature for image authenticationIEEE Trans. Consumer Electron., 46
Tiago Queluz (2001)
Authentication of digital images and video: Generic models and a new contributionSignal Process. Image Commun., 16
F. Lefèbvre, B. Macq, J. Legat (2002)
RASH: RAdon soft hash algorithm2002 11th European Signal Processing Conference
Chun-Shien Lu, Chao-Yong Hsu (2005)
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authenticationMultimedia Systems, 11
F. Ahmed, M. Siyal, V. Abbas (2010)
A secure and robust hash-based scheme for image authenticationSignal Process., 90
(2005)
ACM Workshop on Security and Privacy in Digital Rights Management
V. Monga, A. Banerjee, B. Evans (2004)
Clustering algorithms for perceptual image hashing3rd IEEE Signal Processing Education Workshop. 2004 IEEE 11th Digital Signal Processing Workshop, 2004.
S. Kozat, R. Venkatesan, M. Mihçak (2004)
Robust perceptual image hashing via matrix invariants2004 International Conference on Image Processing, 2004. ICIP '04., 5
J. Dittmann, A. Steinmetz, R. Steinmetz (1999)
Content-based digital signature for motion pictures authentication and content-fragile watermarkingProceedings IEEE International Conference on Multimedia Computing and Systems, 2
D. Koutsonanos, D. Simitopoulos, M. Strintzis (2003)
Robust image watermarking based on generalized Radon transformationsIEEE Trans. Circuits Syst. Video Technol., 13
M. Mihçak, R. Venkatesan (2001)
New Iterative Geometric Methods for Robust Perceptual Image Hashing
R. Venkatesan, S. Koon, M. Jakubowski, P. Moulin (2000)
Robust image hashingProceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 3
We proposed an image signature method for content authentication, which applies a hierarchical approach to construct an image signature. In the first level, DWT and DCT are used to extract image features; then these features are encrypted by using sub-keys that are generated by a cryptographically hash function. In the second level, KarhunenLoeve transformation is used to reduce the signature length. The main features of the proposed method are as follows: (i) It achieves a trade-off between robustness and tampering sensitivity. (ii) It provides a tool for image tampering detection and tampering localization. (iii) It can be used to detect the thumbnail of the large image to improve detection efficiency. (iv) It provides the compact signature, and the signature length is independent of the image size. Experimental results show that proposed method is robust for content-preserving manipulations such as JPEG compression, adding noise, filtering and Gamma correction, etc.
The Computer Journal – Oxford University Press
Published: Jun 15, 2012
Keywords: image authentication image signature image hash tampering detection DWT-DCT; KL transformation Huffman encoding
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.