In this paper, a novel hash-based image content authentication scheme for tamper detection and localization is proposed. The original image is divided into sub-blocks whose size can be tuned with the accuracy of tamper localization, and the measurements which are obtained in the compressed sensing (CS) process contain all the information of the subblocks. Moreover, singular value decomposition (SVD) is applied to capture the most energy of measurements and compress them into a compact hash. Experimental results have shown that the proposed method is robust with a reliable security. ? 2014 IEEE.EI244-24
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
In this paper, we use a generalized model for all the previously proposed pixel-wise authentication ...
Nowadays, image authentication techniques are widely applied to digital multimedia to address their ...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
This paper proposes a novel tamper detection, localization, and recovery scheme for encrypted images...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash ...
[[abstract]]In this paper, we propose an image authentication scheme in which image features are emb...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability o...
Abstract — A robust authentication method is developed for detecting image forgery including removal...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
Abstract. Image authentication is becoming very important for certifying data integrity. A key issue...
International audienceA novel robust image hashing scheme based on quaternion Zernike moments (QZMs)...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
In this paper, we use a generalized model for all the previously proposed pixel-wise authentication ...
Nowadays, image authentication techniques are widely applied to digital multimedia to address their ...
In the last decade, the increased possibility to produce, edit, and disseminate multimedia contents ...
This paper proposes a novel tamper detection, localization, and recovery scheme for encrypted images...
In this paper, a new image hashing scheme satisfying robustness and security is proposed. We exploit...
Hashes can be used to provide authentication of multimedia con-tents. In the case of images, a hash ...
[[abstract]]In this paper, we propose an image authentication scheme in which image features are emb...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability o...
Abstract — A robust authentication method is developed for detecting image forgery including removal...
AbstractImage hashing technique constructs a short sequence from the image to represent its contents...
Abstract. Image authentication is becoming very important for certifying data integrity. A key issue...
International audienceA novel robust image hashing scheme based on quaternion Zernike moments (QZMs)...
Perceptual hashing is a promising solution to image content authentication. However, conventional im...
Part 1: Research PapersInternational audiencePerceptual hashing is a promising solution to image con...
In this paper, we use a generalized model for all the previously proposed pixel-wise authentication ...
Nowadays, image authentication techniques are widely applied to digital multimedia to address their ...