2009
DOI: 10.1016/j.jvcir.2009.03.010
|View full text |Cite
|
Sign up to set email alerts
|

Iterative compensation schemes for multimedia content authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In this approach, the digital signature retrieved from an image is compared with the digital signature stored by the third party. Comparing the two signatures helps us to detect whether the image has been tampered with or not [5,6,7,8]. The watermarking method can be categorized into robust watermarking [9,10,11,12,13,14,15], semi-fragile watermarking [16,17,18,19] and fragile watermarking [20,21,22,23,24,25,26,27,28,29,30,31,32,33,34].…”
Section: Introductionmentioning
confidence: 99%
“…In this approach, the digital signature retrieved from an image is compared with the digital signature stored by the third party. Comparing the two signatures helps us to detect whether the image has been tampered with or not [5,6,7,8]. The watermarking method can be categorized into robust watermarking [9,10,11,12,13,14,15], semi-fragile watermarking [16,17,18,19] and fragile watermarking [20,21,22,23,24,25,26,27,28,29,30,31,32,33,34].…”
Section: Introductionmentioning
confidence: 99%
“…In this approach, the digital signature extracted from the image is compared to a digital signature stored by a third party. Comparing the two signatures may detect if the image has been tampered with [3][4][5]. This method makes it easy to determine whether an image is authentic or not, but they cannot find the tampered area.…”
Section: Introductionmentioning
confidence: 99%
“…In general, image authentication schemes can be classified into two categories. One is the signature-based approach [1,13] and the other is the fragile watermarking approach [2-7, 12, 16]. In signature-based schemes, a host image is applied to the hash function and the hashed result is then encoded by using a public key cryptosystem to produce the corresponding digital signature.…”
Section: Introductionmentioning
confidence: 99%