Abstract. Image authentication is becoming very important for certifying data integrity. A key issue in image authentica-tion is the design of a compact signature that contains suffi-cient information to detect illegal tampering yet is robust un-der allowable manipulations. In this paper, we recognize that most permissible operations on images are global distortions like low-pass filtering and JPEG compression, whereas illegal data manipulations tend to be localized distortions. To exploit this observation, we propose an image authentication scheme where the signature is the result of an extremely low-bit-rate content-based compression. The content-based compression is guided by a space-variant weighting function whose values are higher in ...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
Abstract—This paper present a novel content-based image authentication framework which embeds the se...
[[abstract]]Fragile watermarking techniques are developed to ensure the credibility and integrity of...
Authentication of image data is a challenging task. Unlike data authentication systems that detect a...
[[abstract]]This paper presents a robust image authentication approach that distinguishes malicious ...
This paper presents a robust image authentication approach that distinguishes malicious attacks from...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
[[abstract]]In this paper, we propose an image authentication scheme in which image features are emb...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Abstract — In [1, 2, 3], we have briefly introduced a robust and secure digital signature solution f...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
In multimedia communication, compression of data is essential to improve transmission rate, and mini...
Image authentication has applications in security systems, photo forensics, and photo journalism. Th...
Abstract We propose a content-based semi-fragile watermarking algorithm for image authentication. In...
[[abstract]]We propose an adaptive watermarking technique that is robust to JPEG compression and sen...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
Abstract—This paper present a novel content-based image authentication framework which embeds the se...
[[abstract]]Fragile watermarking techniques are developed to ensure the credibility and integrity of...
Authentication of image data is a challenging task. Unlike data authentication systems that detect a...
[[abstract]]This paper presents a robust image authentication approach that distinguishes malicious ...
This paper presents a robust image authentication approach that distinguishes malicious attacks from...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
[[abstract]]In this paper, we propose an image authentication scheme in which image features are emb...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Abstract — In [1, 2, 3], we have briefly introduced a robust and secure digital signature solution f...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
In multimedia communication, compression of data is essential to improve transmission rate, and mini...
Image authentication has applications in security systems, photo forensics, and photo journalism. Th...
Abstract We propose a content-based semi-fragile watermarking algorithm for image authentication. In...
[[abstract]]We propose an adaptive watermarking technique that is robust to JPEG compression and sen...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
Abstract—This paper present a novel content-based image authentication framework which embeds the se...
[[abstract]]Fragile watermarking techniques are developed to ensure the credibility and integrity of...