Tamper Detection of Digital Images using Hash Functions

@article{Woo2014TamperDO,
  title={Tamper Detection of Digital Images using Hash Functions},
  author={Chan-Il Woo and Seung-dae Lee},
  journal={The Korea Academia-Industrial cooperation Society},
  year={2014},
  volume={15},
  pages={4516-4521}
}
Abstract Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for… Expand

References

SHOWING 1-7 OF 7 REFERENCES
A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections
TLDR
Experimental results show that the tamper detection capability of the proposed fragile self-recovery watermarking scheme is superior to other techniques. Expand
A public key watermark for image verification and authentication
  • P. Wong
  • Computer Science
  • Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
  • 1998
TLDR
A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key. Expand
A hierarchical digital watermarking method for image tamper detection and recovery
TLDR
This method is efficient as it only uses simple operations such as parity check and comparison between average intensities and effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. Expand
Watermarking for image authentication
  • Min Wu, Bede Liu
  • Computer Science
  • Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
  • 1998
TLDR
A data embedding method is proposed for image authentication based on table look-up in frequency domain that can detect and localize alterations of the original image, such as the tampering of images exported from a digital camera. Expand
Counterfeiting attacks on block-wise dependent fragile watermarking schemes
TLDR
Vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked images, where they could still be verified as authentic, though they are actually not are considered. Expand
Image Watermarking Using LSB (Least Significant Bit)
TLDR
This paper presents a watermarking technique which least significant bits (LSB), its steps and its process with matlab images, which provide security of data. Expand
A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR
TLDR
Using this algorithm it is possible to reproduce the original image with no loss of information for the encryption and decryption process and it has passed all the security requirements and it is fast and secure to be used in very broad range of industrial applications. Expand