Proceedings IEEE International Conference on Multimedia Computing and Systems
DOI: 10.1109/mmcs.1999.778274
|View full text |Cite
|
Sign up to set email alerts
|

Content-based digital signature for motion pictures authentication and content-fragile watermarking

Abstract: The development of new multimedia services and environments requires new concepts both to support the new working process and to protect the multimedia data during the production and distribution. This article addresses imagehideo authentication and copyright protection as major security demands in digital marketplaces. First we present a content-based signature technique for image and video authenticity and integrity. Based on this technique, we introduce a tool for interactive video authentication and propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
84
0

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 127 publications
(84 citation statements)
references
References 6 publications
0
84
0
Order By: Relevance
“…Ditmann [17] and Queluz [18] used the edge /corner of the image as the feature to generate the digital signature. They claimed this feature is robust against high quality compression and scaling but the problem is that the signature generated based on the edge is too long, and the consistency of the edge itself is also a problem.…”
Section: Digital Signaturementioning
confidence: 99%
See 1 more Smart Citation
“…Ditmann [17] and Queluz [18] used the edge /corner of the image as the feature to generate the digital signature. They claimed this feature is robust against high quality compression and scaling but the problem is that the signature generated based on the edge is too long, and the consistency of the edge itself is also a problem.…”
Section: Digital Signaturementioning
confidence: 99%
“…Similar to Dittmann's [17] content based digital signature approach for image/ video authentication using edge characteristics, Bhattacharjee and Kutter [25] proposed a scheme to generate a digital signature by encrypting the feature points positions in an image. In this approach authentication is accomplished by comparing the positions of the feature point extracted from the targeted image with those decrypted from the previously encrypted digital signature.…”
Section: Digital Signaturementioning
confidence: 99%
“…the StirMark attack). One major drawback of classical watermarking [1,2,3,4] as well as digital signature schemes [5,6,7,8] is the lack of robustness to geometric distortions. For this reason, significant attention has been devoted in recent years towards developing geometrically invariant watermarking schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the scheme for the authenticity and integrity of image protection becomes essential and meaningful. To solve this problem, digital signatures [1,2] and digital image watermarking [3] are proposed. Because digital signatures can only estimate whether images are tampered but cannot locate the tampered region, the watermarking technique, an effective method to solve the copyright problem of image content, is proposed.…”
Section: Introductionmentioning
confidence: 99%