Proceedings ArticleDOI
Image authentication using soft hashing technique
Fawad Ahmed,Mohammed Yakoob Siyal +1 more
- pp 1-5
Reads0
Chats0
TLDR
An image hashing technique that attempts to simultaneously address the robustness, fragility and security issues is presented and an improved version of this scheme with a wavelet-based smoothening to improve robustness against JPEG compression and a modified intensity-transformation for enhancing the security.Abstract:
Designing a hash function for multimedia authentication encompasses many issues like robustness to non- malicious distortion, sensitivity to detect malicious manipulations and security In this paper, we present an image hashing technique that attempts to simultaneously address the robustness, fragility and security issues This scheme is an improved version of our previously proposed scheme [1] with a wavelet-based smoothening to improve robustness against JPEG compression and a modified intensity-transformation for enhancing the security Several experimental results are presented to demonstrate the effectiveness of the proposed schemeread more
Citations
More filters
Journal ArticleDOI
A secure and robust hash-based scheme for image authentication
TL;DR: The proposed hash-based image authentication scheme uses secret key to randomly modulate image pixels to create a transformed feature space to calculate the image hash, which can detect minute tampering with localization of the tampered area.
DissertationDOI
Encryption, authentication and copyright protection techniques for digital images.
TL;DR: A JPEG compression tolerant image encryption scheme is proposed using some very interesting properties of orthogonal matrices that provides high level of security against various cryptographic attacks, and in addition, can also tolerate JPEG compression.
References
More filters
Journal ArticleDOI
A robust image authentication method distinguishing JPEG compression from malicious manipulation
Ching-Yung Lin,Shih-Fu Chang +1 more
TL;DR: An effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression, and describes adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling.
Journal ArticleDOI
Secret and public key image watermarking schemes for image authentication and ownership verification
Ping Wah Wong,Nasir Memon +1 more
TL;DR: A watermarking scheme for ownership verification and authentication that requires a user key during both the insertion and the extraction procedures, and which can detect any modification made to the image and indicate the specific locations that have been modified.
Journal ArticleDOI
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
M. Holliman,Nasir Memon +1 more
TL;DR: It is shown that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack.
Journal ArticleDOI
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
Vishal Monga,Brian L. Evans +1 more
TL;DR: The proposed image hashing paradigm using visually significant feature points is proposed, which withstands standard benchmark attacks, including compression, geometric distortions of scaling and small-angle rotation, and common signal-processing operations.
Proceedings ArticleDOI
A robust soft hash algorithm for digital image signature
TL;DR: The radon transform and principal component analysis are used to extract characteristics robust against geometrical transformation (rotation and scaling) and image processing attacks (compression, filtering, blurring).
Related Papers (5)
Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks
Fang Liu,Lee-Ming Cheng +1 more