Image authentication verifies the originality of an image by detecting malicious manipulations. The existing image authentication methods are able to detect the tampered regions, but too fragile to resist incidental distortions. This paper will present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. By dividing an image into blocks and then expressing the size comparison of the average of three random blocks in a binary tree structure, we use this as the image authenticator. Experimental results indicate that this technique is effective for image authentication. © Springer-Verlag 2004.
CITATION STYLE
Kim, M. A., Song, G. S., & Lee, W. H. (2004). A robust image authentication method surviving acceptable modifications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3043, 722–727. https://doi.org/10.1007/978-3-540-24707-4_84
Mendeley helps you to discover research relevant for your work.