2005 IEEE International Conference on Multimedia and Expo
DOI: 10.1109/icme.2005.1521402
|View full text |Cite
|
Sign up to set email alerts
|

Image Authentication Under Geometric Attacks Via Structure Matching

Abstract: Surviving geometric attacks in image authentication is considered to be of great importance. This is because of the vulnerability of classical watermarking and digital signature based schemes to geometric image manipulations, particularly local geometric attacks. In this paper, we present a general framework for image content authentication using salient feature points. We first develop an iterative feature detector based on an explicit modeling of the human visual system. Then, we compare features from two im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(31 citation statements)
references
References 23 publications
1
30
0
Order By: Relevance
“…Monga and Vats tested the same algorithm with another wavelet function [94]. The results were very similar.…”
Section: Content-based Characteristics Extractionsupporting
confidence: 55%
“…Monga and Vats tested the same algorithm with another wavelet function [94]. The results were very similar.…”
Section: Content-based Characteristics Extractionsupporting
confidence: 55%
“…Hence the total size of the hash h is L = 920 bits (< 1kB). Figure 3 depicts the ROC curves for 5 state-of-the art methods based on Fourier-Mellin invariants (FMI) [2], radial basis projections(RASH) [3], wavelets [5], SVD [4], structure matching (Feature) [1] compared to the proposed method. The hash component h 1 was used in this comparison.…”
Section: Experiments and Analysismentioning
confidence: 99%
“…Existing image hashing methods (that primarily address the issue of robustness) can be categorized as belonging to (1) exhaustive search based [1] and (2) robust representation based approach [2,3,4,5,7]. In an exhaustive search based approach, the noise N is modeled by some fixed distortion model (e.g., affine transform) and the hash h carries some alignment information about the original.…”
Section: Introductionmentioning
confidence: 99%
“…First, the system employs the decoded random projections to perform image registration. In this example, the top-left corner of the cropped image is at θ = [13,18]. The coarse search returns the estimateθ C = [16,16], which is further refined toθ R = [13,18] when working at full resolution.…”
Section: An Illustrative Examplementioning
confidence: 99%
“…In this example, the top-left corner of the cropped image is at θ = [13,18]. The coarse search returns the estimateθ C = [16,16], which is further refined toθ R = [13,18] when working at full resolution. Figure 12 illustrates the error surface explored during the refinement step, where each point represents the value of the MSE between y θ andỹ for a given value of the parameter θ.…”
Section: An Illustrative Examplementioning
confidence: 99%