Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A robust image authentication method surviving acceptable modifications

Authors
Kim, M.-A.Song, G.-S.Lee, W.-H.
Issue Date
May-2004
Publisher
SPRINGER-VERLAG BERLIN
Citation
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, v.3043, pp 722 - 727
Pages
6
Journal Title
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1
Volume
3043
Start Page
722
End Page
727
URI
https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/53156
DOI
10.1007/978-3-540-24707-4_84
ISSN
0302-9743
1611-3349
Abstract
Image authentication verifies the originality of an image by detecting malicious manipulations. The existing image authentication methods are able to detect the tampered regions, but too fragile to resist incidental distortions. This paper will present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. By dividing an image into blocks and then expressing the size comparison of the average of three random blocks in a binary tree structure, we use this as the image authenticator. Experimental results indicate that this technique is effective for image authentication.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School of Advanced Imaging Sciences, Multimedia and Film > Department of Imaging Science and Arts > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE