A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Robust and Secure Media Signature Scheme for JPEG Images
2005
Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology
In [1, 2, 3], we have briefly introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correction coding (ECC), ...
In this paper, we firstly study the difference between two types of distortions, namely incidental distortions which come from the defined acceptable content manipulations such as lossy compression and ...
Figure 1 .Figure 2 .Figure 3 . 123 Digital signature schemes for message / content authentication. (a) Traditional crypto signature scheme for fragile authentication. ...
doi:10.1007/s11265-005-4154-0
fatcat:dbj7ql4awzdyhllqkd742ca5ai
Structural digital signature for image authentication: an incidental distortion resistant scheme
2003
IEEE transactions on multimedia
This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. ...
Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication. ...
Kutter for providing the beach image and the umbrella image used in the experiments. ...
doi:10.1109/tmm.2003.811621
fatcat:yj5s5xpnhvezbaejtejwbmjjlu
A secure and robust digital signature scheme for JPEG2000 image authentication
2005
IEEE transactions on multimedia
In this paper we present a secure and robust content based digital signature scheme for verifying the authenticity of JPEG2000 images quantitatively, in terms of a unique concept named Lowest Authenticable ...
The whole scheme, which is extended from the crypto data-based digital signature scheme, mainly comprises signature generation / verification, Error Correction Coding (ECC) and watermark embedding / extracting ...
., Ltd.) and Dr. C.-Y. Lin (IBM) for very helpful discussions. The source of testing images: www.jpeg.org. ...
doi:10.1109/tmm.2005.846776
fatcat:bwvh35ss2jay3mhpaxynqweksy
Structural digital signature for image authentication
2000
Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00
This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. ...
Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication. ...
Kutter for providing the beach image and the umbrella image used in the experiments. ...
doi:10.1145/357744.357893
dblp:conf/mm/LuL00
fatcat:tausqnqqjnhgfhbzwohqw526ym
A Dct-Based Secure Jpeg Image Authentication Scheme
2009
Zenodo
In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. ...
A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. ...
Two approaches have been suggested for achieving the authenticity of digital images: 1) the digital signature-based method [1] [2] [3] [4] , and 2) the digital watermark-based method [5] [6] [7] [8] ...
doi:10.5281/zenodo.1070358
fatcat:6qbp6ugzqbhjhffpkbljha7mo4
Quality-Optimized and Secure End-to-End Authentication for Media Delivery
2008
Proceedings of the IEEE
By applying conventional cryptographic hashes and digital signatures to the media packets, the system security is similar to that achievable in conventional data security. ...
The need for security services, such as confidentiality and authentication, have become one of the major concerns in multimedia communication applications, such as video on demand and peer-to-peer content ...
The experimental results presented in this paper are merely for illustrative purposes, and more detailed and rigorous test results are given in [20] [21] [22] [39] [40] [43] . ...
doi:10.1109/jproc.2007.909926
fatcat:jqhgrv43dnb6tiezksw5l2heoa
Multimedia Authentication and Watermarking
[chapter]
2003
Signals and Communication Technology
Two types of authentication techniques have been developed in cryptography: digital signature and message authentication codes (MACs) [1, 2] . ...
People seek for information with integrity and authenticity. This makes detection of illegal manipulations an important issue for digital multimedia. ...
It is clear that the content-based authentication has the largest tolerance to distortion since perceptible distortion may not change the semantic meaning, and the hard authentication has the least tolerance ...
doi:10.1007/978-3-662-05300-3_7
fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i
Semifragile Watermarking Schemes for Image Authentication- A Survey
2012
International Journal of Computer Network and Information Security
So, integrity of digital image must be authenticated. ...
Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content. ...
The digital-signature-based image authentication scheme computes the digest for an image and stores it in a separate file. ...
doi:10.5815/ijcnis.2012.02.07
fatcat:erve72akj5g4flymokbjirrsze
A CRYPTO SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNEL
2005
International Journal of Image and Graphics
21 With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded im-23 ages despite lossy compression ...
In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic 25 signature scheme to make the digital signatures robust to these image degradations ...
This may be acceptable because the major system performances are system robustness (i.e. the image distorted by acceptable manipulations should be 25 authentic) and system security (i.e. the image distorted ...
doi:10.1142/s0219467805001690
fatcat:cxafsl6ivveldjsz3qly4gtwua
A new technique for authentication of image/video for multimedia applications
2001
Proceedings of the 2001 workshop on Multimedia and security new challenges - MM&Sec '01
The proposed digital signature is composed of visually important and compression-tolerant features in images/videos. ...
In this study, we propose a new image/video authentication system based on the digital signature technique. ...
For color images and videos, the proposed method can be used to generate the digital signature for the luminance channel (Y) and the chrominance channels (U and V). ...
doi:10.1145/1232454.1232464
dblp:conf/mmsec/TzengT01
fatcat:aaed2nxtn5gifng3pbzh6ms354
A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain
2013
International Journal of Network Security
In this paper, a semi-fragile image authentication technique based on secure hash generated with Orthogonal Polynomials based Transformation (OPT) coefficients is proposed. ...
Image Authentication techniques enable the recipients to verify the integrity of the received image. ...
Table 1 : 1 Results after incidental distortions on various test images Image Incidental distortions Parameter ...
dblp:journals/ijnsec/Malarchelvi13
fatcat:u6y6abvppzdqtjsulnqxshm4je
ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication
2015
Bonfring International Journal of Advances in Image Processing
The watermarked images demonstrate high imperceptibility and make it suitable for use in artistic, medical and military applications where high quality and minimal distortion of the watermarked images ...
content based image authentication is considered in this paper. ...
Tolerance to Incidental Distortions The watermarked image is subject to incidental noises as mentioned in Table 4 . ...
doi:10.9756/bijaip.10395
fatcat:ikczdqgdlbathdew2wripp6aju
Permutation-based Homogeneous Block Content Authentication for Watermarking
2013
International Journal of Image Graphics and Signal Processing
In modern days, digital watermarking has become an admired technique for hitting data in digital images to help guard against copyright infringement. ...
The proposed Permutation-based Homogeneous Block Content authentication (PHBC) methods develop a secure and excellence strong watermarking algorithm that combines the reward of permutation-based Homogeneous ...
Satyanarayana Raju, Founder & Chairman and Sri K. Sasi Kiran Varma, Managing Director, Chaitanya group of Institutions for providing necessary Infrastructure. ...
doi:10.5815/ijigsp.2013.02.04
fatcat:47gfmztgfvf2nfbujpp4hhym7m
Improved Protection Using Self-Recognized Image
english
2015
International Journal of Innovative Research in Computer and Communication Engineering
english
The protection of data can be done by several mechanism to secure and achieve authenticity and integrity of data. ...
For evaluating the watermarking methods performance it must be concentrate on the robustness of watermarked image quality and restored image quality. ...
., proposed a new digital signature scheme which makes use of an images contents to construct a structural digital signature for image authentication. ...
doi:10.15680/ijircce.2015.0301001
fatcat:yc5swpcfzbcmdbkbhoc3d72ywi
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication
2012
Journal of Information Security
Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. ...
The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. ...
Image authentication is used for verifying the integrity and authenticity of digital images [1] . ...
doi:10.4236/jis.2012.33023
fatcat:eppi6bojjzeolliypmn4u3a6uq
« Previous
Showing results 1 — 15 out of 828 results