International Conference on Semantic Computing (ICSC 2007) 2007
DOI: 10.1109/icsc.2007.100
|View full text |Cite
|
Sign up to set email alerts
|

Content-based Image Authentication: Current Status, Issues, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…, N} called the tamper detection mark (TDM) is used to represent the location of tampering [13], where N is the number of 2×2 blocks in the test image Z. As in the watermark insertion process, according to (1) and (2), the binary random sequence B, two mapping sequences Ψ and Λ are obtained by the same secret key. The tamper detection procedure includes the following steps.…”
Section: Tamper Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…, N} called the tamper detection mark (TDM) is used to represent the location of tampering [13], where N is the number of 2×2 blocks in the test image Z. As in the watermark insertion process, according to (1) and (2), the binary random sequence B, two mapping sequences Ψ and Λ are obtained by the same secret key. The tamper detection procedure includes the following steps.…”
Section: Tamper Detectionmentioning
confidence: 99%
“…The purpose of fragile watermarking is to achieve multimedia content authentication by imperceptibly embedding additional information into the host media [1,2]. Many fragile watermarking schemes have been developed for digital images to detect accurately the tampered areas [3] and further recover approximately the original content in the tampered areas [4], which is also called the self-correcting or self-embedding watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of computer technology, the users can manipulate the digital images easily and professionally with the image editing tools [1]. Now the recoverable authentication watermarking is usually used to verify the integrity of the image content.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the existing image hashing studies mainly focus on the feature extraction stage and use them during authentication, which can roughly be classified into the four following categories (Zhu et al, 2010), (Han & Chu, 2010):…”
Section: Perceptual Image Hashing Methods Classificationmentioning
confidence: 99%
“…Therefore, bit-by-bit verification is no longer a suitable method for multimedia data authentication. A rough classification of content-preserving and content-changing manipulations is given in Table 1 (Han & Chu, 2010). Robust perceptual image hashing methods have recently been proposed as primitives to overcome the above problems and have constituted the core of a challenging developing research area to academia as well as the multimedia industry.…”
mentioning
confidence: 99%