Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








828 Hits in 4.8 sec

A Robust and Secure Media Signature Scheme for JPEG Images

Qibin Sun, Shih-Fu Chang
2005 Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology  
In [1, 2, 3], we have briefly introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correction coding (ECC),  ...  In this paper, we firstly study the difference between two types of distortions, namely incidental distortions which come from the defined acceptable content manipulations such as lossy compression and  ...  Figure 1 .Figure 2 .Figure 3 . 123 Digital signature schemes for message / content authentication. (a) Traditional crypto signature scheme for fragile authentication.  ... 
doi:10.1007/s11265-005-4154-0 fatcat:dbj7ql4awzdyhllqkd742ca5ai

Structural digital signature for image authentication: an incidental distortion resistant scheme

Chun-Shien Lu, H.-Y.M. Liao
2003 IEEE transactions on multimedia  
This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication.  ...  Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication.  ...  Kutter for providing the beach image and the umbrella image used in the experiments.  ... 
doi:10.1109/tmm.2003.811621 fatcat:yj5s5xpnhvezbaejtejwbmjjlu

A secure and robust digital signature scheme for JPEG2000 image authentication

Qibin Sun, Shih-Fu Chang
2005 IEEE transactions on multimedia  
In this paper we present a secure and robust content based digital signature scheme for verifying the authenticity of JPEG2000 images quantitatively, in terms of a unique concept named Lowest Authenticable  ...  The whole scheme, which is extended from the crypto data-based digital signature scheme, mainly comprises signature generation / verification, Error Correction Coding (ECC) and watermark embedding / extracting  ...  ., Ltd.) and Dr. C.-Y. Lin (IBM) for very helpful discussions. The source of testing images: www.jpeg.org.  ... 
doi:10.1109/tmm.2005.846776 fatcat:bwvh35ss2jay3mhpaxynqweksy

Structural digital signature for image authentication

Chun-Shien Lu, Hong-Yuan Mark Liao
2000 Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00  
This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication.  ...  Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication.  ...  Kutter for providing the beach image and the umbrella image used in the experiments.  ... 
doi:10.1145/357744.357893 dblp:conf/mm/LuL00 fatcat:tausqnqqjnhgfhbzwohqw526ym

A Dct-Based Secure Jpeg Image Authentication Scheme

Mona F. M. Mursi, Ghazy M.R. Assassa, Hatim A. Aboalsamh, Khaled Alghathbar
2009 Zenodo  
In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations.  ...  A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain.  ...  Two approaches have been suggested for achieving the authenticity of digital images: 1) the digital signature-based method [1] [2] [3] [4] , and 2) the digital watermark-based method [5] [6] [7] [8]  ... 
doi:10.5281/zenodo.1070358 fatcat:6qbp6ugzqbhjhffpkbljha7mo4

Quality-Optimized and Secure End-to-End Authentication for Media Delivery

Qibin Sun, John Apostolopoulos, Chang Wen Chen, Shih-Fu Chang
2008 Proceedings of the IEEE  
By applying conventional cryptographic hashes and digital signatures to the media packets, the system security is similar to that achievable in conventional data security.  ...  The need for security services, such as confidentiality and authentication, have become one of the major concerns in multimedia communication applications, such as video on demand and peer-to-peer content  ...  The experimental results presented in this paper are merely for illustrative purposes, and more detailed and rigorous test results are given in [20] [21] [22] [39] [40] [43] .  ... 
doi:10.1109/jproc.2007.909926 fatcat:jqhgrv43dnb6tiezksw5l2heoa

Multimedia Authentication and Watermarking [chapter]

Bin B. Zhu, Mitchell D. Swanson
2003 Signals and Communication Technology  
Two types of authentication techniques have been developed in cryptography: digital signature and message authentication codes (MACs) [1, 2] .  ...  People seek for information with integrity and authenticity. This makes detection of illegal manipulations an important issue for digital multimedia.  ...  It is clear that the content-based authentication has the largest tolerance to distortion since perceptible distortion may not change the semantic meaning, and the hard authentication has the least tolerance  ... 
doi:10.1007/978-3-662-05300-3_7 fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i

Semifragile Watermarking Schemes for Image Authentication- A Survey

Archana Tiwari, Manisha Sharma
2012 International Journal of Computer Network and Information Security  
So, integrity of digital image must be authenticated.  ...  Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content.  ...  The digital-signature-based image authentication scheme computes the digest for an image and stores it in a separate file.  ... 
doi:10.5815/ijcnis.2012.02.07 fatcat:erve72akj5g4flymokbjirrsze

A CRYPTO SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNEL

QIBIN SUN, SHUIMING YE, CHING-YUNG LIN, SHIH-FU CHANG
2005 International Journal of Image and Graphics  
21 With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded im-23 ages despite lossy compression  ...  In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic 25 signature scheme to make the digital signatures robust to these image degradations  ...  This may be acceptable because the major system performances are system robustness (i.e. the image distorted by acceptable manipulations should be 25 authentic) and system security (i.e. the image distorted  ... 
doi:10.1142/s0219467805001690 fatcat:cxafsl6ivveldjsz3qly4gtwua

A new technique for authentication of image/video for multimedia applications

Chih-Hsuan Tzeng, Wen-Hsiang Tsai
2001 Proceedings of the 2001 workshop on Multimedia and security new challenges - MM&Sec '01  
The proposed digital signature is composed of visually important and compression-tolerant features in images/videos.  ...  In this study, we propose a new image/video authentication system based on the digital signature technique.  ...  For color images and videos, the proposed method can be used to generate the digital signature for the luminance channel (Y) and the chrominance channels (U and V).  ... 
doi:10.1145/1232454.1232464 dblp:conf/mmsec/TzengT01 fatcat:aaed2nxtn5gifng3pbzh6ms354

A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain

P. D. Sheba Kezia Malarchelvi
2013 International Journal of Network Security  
In this paper, a semi-fragile image authentication technique based on secure hash generated with Orthogonal Polynomials based Transformation (OPT) coefficients is proposed.  ...  Image Authentication techniques enable the recipients to verify the integrity of the received image.  ...  Table 1 : 1 Results after incidental distortions on various test images Image Incidental distortions Parameter  ... 
dblp:journals/ijnsec/Malarchelvi13 fatcat:u6y6abvppzdqtjsulnqxshm4je

ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication

Jayashree S Pillai, T. Padma
2015 Bonfring International Journal of Advances in Image Processing  
The watermarked images demonstrate high imperceptibility and make it suitable for use in artistic, medical and military applications where high quality and minimal distortion of the watermarked images  ...  content based image authentication is considered in this paper.  ...  Tolerance to Incidental Distortions The watermarked image is subject to incidental noises as mentioned in Table 4 .  ... 
doi:10.9756/bijaip.10395 fatcat:ikczdqgdlbathdew2wripp6aju

Permutation-based Homogeneous Block Content Authentication for Watermarking

S. Maruthuperumal, G.Rosline Nesa Kumari
2013 International Journal of Image Graphics and Signal Processing  
In modern days, digital watermarking has become an admired technique for hitting data in digital images to help guard against copyright infringement.  ...  The proposed Permutation-based Homogeneous Block Content authentication (PHBC) methods develop a secure and excellence strong watermarking algorithm that combines the reward of permutation-based Homogeneous  ...  Satyanarayana Raju, Founder & Chairman and Sri K. Sasi Kiran Varma, Managing Director, Chaitanya group of Institutions for providing necessary Infrastructure.  ... 
doi:10.5815/ijigsp.2013.02.04 fatcat:47gfmztgfvf2nfbujpp4hhym7m

Improved Protection Using Self-Recognized Image
english

Sanchit Shrikant Mahajan, Prof. Pratima Bhati
2015 International Journal of Innovative Research in Computer and Communication Engineering  
The protection of data can be done by several mechanism to secure and achieve authenticity and integrity of data.  ...  For evaluating the watermarking methods performance it must be concentrate on the robustness of watermarked image quality and restored image quality.  ...  ., proposed a new digital signature scheme which makes use of an images contents to construct a structural digital signature for image authentication.  ... 
doi:10.15680/ijircce.2015.0301001 fatcat:yc5swpcfzbcmdbkbhoc3d72ywi

Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Archana Tiwari, Manisha Sharma
2012 Journal of Information Security  
Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents.  ...  The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking.  ...  Image authentication is used for verifying the integrity and authenticity of digital images [1] .  ... 
doi:10.4236/jis.2012.33023 fatcat:eppi6bojjzeolliypmn4u3a6uq
« Previous Showing results 1 — 15 out of 828 results