Learn More
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that the hidden data cannot be extracted out correctly after compression or other incidental alteration has been applied to the stego-image. The only(More)
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the above criterion. Fulfilling this is difficult because of two(More)
Digital images can be forged easily with today’s widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checking inconsistencies of blocking artifact. Given a digital image, we find that the blocking artifacts introduced during JPEG compression could be used as a “natural authentication(More)
A novel H.264/AVC watermarking method is proposed in this paper. By embedding the robust watermark into DCT domain and the fragile watermark into motion vectors respectively, the proposed method can jointly achieve both copyright protection and authentication. Our scheme outperforms other video watermarking schemes on higher watermarking capacity especially(More)
In this paper, we investigate the prospect of using bicoherence features for blind image splicing detection. Image splicing is an essential operation for digital photomontaging, which in turn is a technique for creating image forgery. We examine the properties of bicoherence features on a data set, which contains image blocks of diverse image properties. We(More)
A blind print-scan (PS) resilient watermarking scheme is proposed in this paper. By employing a series of novel solutions in block classification and different block-based embedding strategies, we achieved a good performance in terms of watermark capacity, robustness and image quality. The experimental results further demonstrate the validity of our(More)
Semi-fragile watermarking techniques aim at detecting malicious manipulations on an image, while allowing acceptable manipulations such as lossy compression. Although both of these manipulations are considered to be pixel value changes, semi-fragile watermarks should be sensitive to malicious manipulations but robust to the degradation introduced by lossy(More)
Recently, among various data hiding techniques, a new subset, lossless data hiding, has drawn tremendous interests. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that they will be defeated when compression or other small alteration is applied to the marked image. De Vleeschouwer et al’s method is the only existing(More)
In this paper, we propose an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authentic. In a JPEG-2000 codestream some packets are more important than others in terms of coding dependency and visual quality. This inspires us to allocate more(More)