Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way. When the authentica-tion check fails, it might be useful to localize the tampering in the spatial domain. This paper proposes an algorithm based on compres-sive sensing principles, which solves both the authentication and the localization problems. The encoder produces a hash using a small bit budget by quantizing a limited number of random projections of the authentic image. The decoder uses the hash to estimate the distortion between the original and the received image. In addition, if the at-tack is sparse, it can be also localized. In order to keep the size o...
Abstract—This paper presents an innovative algorithm for image tampering detection based on forgery ...
International audienceThis paper focuses on the digital image authentication and forgery localizatio...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-...
In most practical applications, for the sake of information integrity not only it is useful to detec...
Abstract — Media authentication is important in content delivery via untrusted intermediaries, such ...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
Abstract Flawless image forensic analysis necessitates precise identification of tampering regions i...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Abstract — A robust authentication method is developed for detecting image forgery including removal...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability o...
In this paper we propose a novel watermarking scheme for image authentication. A high localization o...
The increasing development of peer-to-peer networks for delivering and sharing multimedia files pose...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Abstract—This paper presents an innovative algorithm for image tampering detection based on forgery ...
International audienceThis paper focuses on the digital image authentication and forgery localizatio...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-...
In most practical applications, for the sake of information integrity not only it is useful to detec...
Abstract — Media authentication is important in content delivery via untrusted intermediaries, such ...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
Abstract Flawless image forensic analysis necessitates precise identification of tampering regions i...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Abstract — A robust authentication method is developed for detecting image forgery including removal...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability o...
In this paper we propose a novel watermarking scheme for image authentication. A high localization o...
The increasing development of peer-to-peer networks for delivering and sharing multimedia files pose...
The proliferation of digital images creates problems for managing large image databases, indexing in...
Abstract—This paper presents an innovative algorithm for image tampering detection based on forgery ...
International audienceThis paper focuses on the digital image authentication and forgery localizatio...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...