Proceedings ArticleDOI
A robust content based digital signature for image authentication
Marc Schneider,Shih-Fu Chang +1 more
- Vol. 3, pp 227-230
TLDR
The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.Abstract:
A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology signature systems can be designed which allow certain types of image modification (e.g. lossy compression) but which prevent other types of manipulation. Some experience with content based signatures is also presented. The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented. This signature also allows smaller segments of the secured video to be verified as unmanipulated.read more
Citations
More filters
Book
Digital Watermarking and Steganography
TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Book
Information Hiding Techniques for Steganography and Digital Watermarking
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI
Exposing digital forgeries by detecting traces of resampling
Alin C. Popescu,Hany Farid +1 more
TL;DR: This work describes how resampling introduces specific statistical correlations, and describes how these correlations can be automatically detected in any portion of an image, and expects this technique to be among the first of many tools that will be needed to expose digital forgeries.
Patent
Steganographic method and device
TL;DR: In this paper, an apparatus and method for encoding and decoding additional information into a stream of digitized samples in an integral manner is presented. But the method does not cause a significant degradation to the sample stream.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
The JPEG still picture compression standard
TL;DR: The Baseline method has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Book
Cryptography: Theory and Practice
TL;DR: The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.
Journal ArticleDOI
The JPEG still picture compression standard
TL;DR: The author provides an overview of the JPEG standard, and focuses in detail on the Baseline method, which has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Book
Digital Pictures: Representation and Compression
TL;DR: Books, as a source that may involve the facts, opinion, literature, religion, and many others are the great friends to join with, becomes what you need to get.