A robust content based digital signature for image authentication

@article{Schneider1996ARC,
  title={A robust content based digital signature for image authentication},
  author={Marc Schneider and Shih-Fu Chang},
  journal={Proceedings of 3rd IEEE International Conference on Image Processing},
  year={1996},
  volume={3},
  pages={227-230 vol.3}
}
A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology signature systems can be designed which allow certain types of image modification (e.g. lossy compression) but which prevent other types of manipulation. Some experience with content based signatures is also presented. The idea of signature based authentication is… CONTINUE READING

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 265 CITATIONS

Data, Engineering and Applications

  • Springer Singapore
  • 2019
VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Robust Image Hashing with Tensor Decomposition

  • IEEE Transactions on Knowledge and Data Engineering
  • 2019
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Research Technique to Authenticate Digital Image Signature Using Cryptography

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Robust and secure perceptual image hashing in the transform domain

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Feature Extraction for Image Understanding in CPODW

  • 2007 International Conference on Machine Learning and Cybernetics
  • 2007
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Image Robust Hashing Based on DCT Sign

  • 2006 International Conference on Intelligent Information Hiding and Multimedia
  • 2006
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Compact and Robust Fingerprints Using DCT Coefficients of Key Blocks

VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

First Summary Report on Authentication

Roberto Caldelli CNIT, Thomas K. Vogel, +5 authors Thierry Pun
  • 2005
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Perceptually based methods for robust image hashing

VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

1997
2019

CITATION STATISTICS

  • 21 Highly Influenced Citations

  • Averaged 7 Citations per year from 2017 through 2019