2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings
DOI: 10.1109/icassp.2006.1660363
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios

Abstract: We propose two identification methods for JPEG-coded images. The purposes are to identify the images that are compressed from the same original image with various compression ratios in fast and robust manner. The first approach can avoid identification leakage or false negative (FN), and could result in a few false positives (FP). The second approach can avoid both FN and FP, with a slightly longer processing time. By combining the two schemes, a faster and a more perfect identification can be achieved, in whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
22
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 8 publications
2
22
0
Order By: Relevance
“…3 [21], [22]. On the other hand, the positions of zero values do not provide any visible information, compared to the features used in [10], [11], [14]- [16]. Besides, the proposed scheme can identify images under various coding conditions, although schemes which Moreover, several image-hashing schemes have been proposed for image retrieval [18]- [20].…”
Section: A Feature Extraction Processmentioning
confidence: 99%
See 2 more Smart Citations
“…3 [21], [22]. On the other hand, the positions of zero values do not provide any visible information, compared to the features used in [10], [11], [14]- [16]. Besides, the proposed scheme can identify images under various coding conditions, although schemes which Moreover, several image-hashing schemes have been proposed for image retrieval [18]- [20].…”
Section: A Feature Extraction Processmentioning
confidence: 99%
“…In the conventional schemes [10], [11], [14]- [16], the signs of coefficients are used as features. However, they have two important limitations.…”
Section: A Feature Extraction Processmentioning
confidence: 99%
See 1 more Smart Citation
“…So far, several identification schemes and image hash functions have been developed for authenticating images [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. They can be broadly classified into two types according to a difference in extracted features: compression method-depended type, to which the proposed scheme corresponds, and compression methodindependent type.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these schemes not only are robust against a difference in compressed levels but also do not produce false negative matches in any compression level. However, the conventional schemes [3][4][5][6][7][9][10][11] do not consider to identify images securely, since it is impossible to avoid the effect caused by a difference in compression levels.…”
Section: Introductionmentioning
confidence: 99%