Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Perceptual hashing for image authentication: A survey

L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through
perception digests based on the understanding of multimedia content. This paper presents a …

Perceptual image hashing based on shape contexts and local feature points

X Lv, ZJ Wang - IEEE Transactions on Information Forensics …, 2012 - ieeexplore.ieee.org
Local feature points have been widely investigated in solving problems in computer vision,
such as robust matching and object detection. However, its investigation in the area of …

A visual model-based perceptual image hash for content authentication

X Wang, K Pang, X Zhou, Y Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Perceptual image hash has been widely investigated in an attempt to solve the problems of
image content authentication and content-based image retrieval. In this paper, we combine …

[PDF][PDF] Video authentication: Issues and challenges

S Upadhyay, SK Singh - International Journal of Computer Science Issues …, 2012 - Citeseer
Video authentication aims to ensure the trustworthiness of the video by verifying the integrity
and source of video data. It has gained much attention in the recent years. In this paper we …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …

Go-sharing: a blockchain-based privacy-preserving framework for cross-social network photo sharing

M Zhang, Z Sun, H Li, B Niu, F Li… - … on Dependable and …, 2022 - ieeexplore.ieee.org
The evolution of social media has led to a trend of posting daily photos on online Social
Network Platforms (SNPs). The privacy of online photos is often protected carefully by …

A self-recovery fragile image watermarking with variable watermark capacity

C Wang, H Zhang, X Zhou - Applied Sciences, 2018 - mdpi.com
Currently, the watermark capacity of most self-recovery fragile image watermarking schemes
is fixed. That means for smooth regions and texture regions, the length of watermark …

Ensuring image integrity using document characteristics

MA Calman, L Gibson, LR Huff, JG Ronca - US Patent 8,639,062, 2014 - Google Patents
Image integrity in an archive can be Verified using document characteristics. Embodiments
of the invention provide a way to Verify the integrity of a stored document image by deter …

Image forensic signature for content authenticity analysis

X Wang, J Xue, Z Zheng, Z Liu, N Li - Journal of Visual Communication and …, 2012 - Elsevier
A novel image forensic approach for content authenticity analysis is proposed. We call it
forensic signature. It is a compact and scalable representation generated by proper …