A robust image authentication method surviving acceptable modifications

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Image authentication verifies the originality of an image by detecting malicious manipulations. The existing image authentication methods are able to detect the tampered regions, but too fragile to resist incidental distortions. This paper will present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. By dividing an image into blocks and then expressing the size comparison of the average of three random blocks in a binary tree structure, we use this as the image authenticator. Experimental results indicate that this technique is effective for image authentication. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Kim, M. A., Song, G. S., & Lee, W. H. (2004). A robust image authentication method surviving acceptable modifications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3043, 722–727. https://doi.org/10.1007/978-3-540-24707-4_84

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free