A robust image authentication method surviving acceptable modifications
- Authors
- Kim, M.-A.; Song, G.-S.; Lee, W.-H.
- Issue Date
- May-2004
- Publisher
- SPRINGER-VERLAG BERLIN
- Citation
- COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, v.3043, pp 722 - 727
- Pages
- 6
- Journal Title
- COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1
- Volume
- 3043
- Start Page
- 722
- End Page
- 727
- URI
- https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/53156
- DOI
- 10.1007/978-3-540-24707-4_84
- ISSN
- 0302-9743
1611-3349
- Abstract
- Image authentication verifies the originality of an image by detecting malicious manipulations. The existing image authentication methods are able to detect the tampered regions, but too fragile to resist incidental distortions. This paper will present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. By dividing an image into blocks and then expressing the size comparison of the average of three random blocks in a binary tree structure, we use this as the image authenticator. Experimental results indicate that this technique is effective for image authentication.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School of Advanced Imaging Sciences, Multimedia and Film > Department of Imaging Science and Arts > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/53156)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.