Learn More
Digital images can be forged easily with today's widely available image processing software. In this paper, we describe a passive approach to detect digital forgeries by checking inconsistencies of blocking artifact. Given a digital image, we find that the blocking artifacts introduced during JPEG compression could be used as a " natural authentication code(More)
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations and distinct queries. Some applications also require the hash to be able to localize image tampering. This requires the hash to contain both robust content and alignment information to meet the above criterion. Fulfilling this is difficult because of two(More)
—Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that the hidden data cannot be extracted out correctly after compression or other incidental alteration has been applied to the stego-image. The only(More)
In this paper, we investigate the prospect of using bicoherence features for blind image splicing detection. Image splicing is an essential operation for digital photomontaging, which in turn is a technique for creating image forgery. We examine the properties of bicoherence features on a data set, which contains image blocks of diverse image properties. We(More)
In this chapter, we will review the research area of passive-blind image forensics, i.e., an form of image analysis for finding out the condition of an image without relying on pre-registration or pre-embedded information. We consider the two main functions of passive-blind image forensics as being image forgery detection and image source identification. In(More)
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the human cognitive ability of association-based memorization to make the authentication more user-friendly, comparing with traditional textual password. Based on the principle of(More)
Most research works on web retrieval latency are object-level based, which we think is insufficient and sometimes inaccurate. In this paper, we propose a fine grained operation-level Web Retrieval Dependency Model (WRDM) to provide more precise capture of web retrieval process. Our model reveals some new factors in web retrieval which cannot be seen at(More)
—In this paper, we describe a configurable content based MPEG video authentication scheme, which is robust to typical video transcoding approaches, namely frame resizing, frame dropping and requantization. By exploiting the synergy between cryptographic signature, forward error correction (FEC) and digital watermarking, the generated content-based message(More)
Recently, among various data hiding techniques, a new subset, lossless data hiding, has drawn tremendous interests. Most of the existing lossless data hiding algorithms are, however, fragile in the sense that they will be defeated when compression or other small alteration is applied to the marked image. De Vleeschouwer et al's method is the only existing(More)
A blind print-scan (PS) resilient watermarking scheme is proposed in this paper. By employing a series of novel solutions in block classification and different block-based embedding strategies, we achieved a good performance in terms of watermark capacity, robustness and image quality. The experimental results further demonstrate the validity of our(More)