Iterative compensation schemes for multimedia content authentication

10Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Multimedia content authentication can be achieved by deriving a fragile content-based signature from a media signal and embedding it robustly back into the signal. The perturbation due to embedding needs to be compensated with mechanisms that lead to producing the original signature. Closed form solutions for compensation are not always feasible. In this paper, we propose two iterative compensation schemes to address such scenarios. The first is based on a set-theoretic approach by using projections onto convex sets (POCS), where signature generation and signal fidelity are modeled as convex constraint sets. The other scheme uses an additive iterative approach used in the cases where the POCS approach is not applicable. Examples of successful image authentication are presented to demonstrate the effectiveness of the proposed schemes over a range of watermark-embedding robustness. A comparison with the closed-form compensation scheme, when feasible, is also presented. © 2009 Elsevier Inc. All rights reserved.

Cite

CITATION STYLE

APA

Ababneh, S., Ansari, R., & Khokhar, A. (2009). Iterative compensation schemes for multimedia content authentication. Journal of Visual Communication and Image Representation, 20(5), 303–311. https://doi.org/10.1016/j.jvcir.2009.03.010

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free