A technique for secure image authentication

被引:0
|
作者
Izquierdo, E [1 ]
机构
[1] Univ London Queen Mary Coll, Dept Elect Engn, London E1 4NS, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Technique for secure image authentication is presented. It is based on a rather unconventional approach: the extremely high sensitivity of ill-posed operators to any change in the input data is turned into the tool to achieve fragile watermarking for secure image verification. Regarding general requirements for secure watermark-based authentication analytical and practical aspects of the introduced technique are discussed. It is shown that the proposed authentication schema is highly secure while providing excellent tamper localization. Several experiments were conducted to demonstrate the effectiveness of the technique when it is subject to different attacks including vector quantization counterfeiting and cropping.
引用
收藏
页码:67 / 73
页数:7
相关论文
共 50 条
  • [1] A secure and localizing watermarking technique for image authentication
    Ouda, AH
    El-Sakka, MR
    [J]. IMAGE ANALYSIS AND RECOGNITION, PT 2, PROCEEDINGS, 2004, 3212 : 759 - 769
  • [2] Secure fragile digital watermarking technique for image authentication
    Alturki, F
    Mersereau, R
    [J]. 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1031 - 1034
  • [3] A secure image authentication technique based on sparse approximation and quantum mechanism
    Agrawal, Rohit
    Tripathi, Kuldeep Narayan
    Singh, Ranjeet Kumar
    Shelke, Nitin Arvind
    Gupta, Umesh
    [J]. DIGITAL SIGNAL PROCESSING, 2024, 147
  • [4] An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
    Nag, Amitava
    Biswas, Debasish
    Ghosh, Soumadip
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    [J]. ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 335 - +
  • [5] Secure Image Encryption and Authentication using the Photon Counting Technique in the Gyrator Domain
    Juan, M. Vilardy O.
    Millan, Maria S.
    Perez-Cabre, Elisabet
    [J]. 2015 20TH SYMPOSIUM ON SIGNAL PROCESSING, IMAGES AND COMPUTER VISION (STSIVA), 2015,
  • [6] SPHinX Authentication Technique: Secure Painting autHentication in eXtended reality
    Bologna, Daniel
    Micciche, Vincenzo
    Violo, Giovanni
    Visconti, Alessandro
    Cannavo, Alberto
    Lamberti, Fabrizio
    [J]. 2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW, 2023, : 941 - 942
  • [7] Efficient and secure image authentication with robustness and versatility
    Chen, Haixia
    Huang, Xinyi
    Wu, Wei
    Mu, Yi
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (12)
  • [8] Secure Image Authentication Using Watermarking and Blockchain
    Abrar, Alsehli
    Abdul, Wadood
    Ghouzali, Sanaa
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 28 (02): : 577 - 591
  • [9] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [10] Efficient and secure image authentication with robustness and versatility
    Haixia Chen
    Xinyi Huang
    Wei Wu
    Yi Mu
    [J]. Science China Information Sciences, 2020, 63