16
Views
18
CrossRef citations to date
0
Altmetric
Articles

Novel image authentication scheme based on quadtree segmentation

Pages 149-162 | Published online: 18 Jul 2013

References

  • Lin, C. Y. and Chang, S. F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol., 2001, 11(2), 153–168.
  • Lou, D. C. and Liu, J. L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electron., 2000, 46(1), 31–39.
  • Fridric, J. Methods for tamper detection in digital image. Multimedia and Security Workshop at ACM Multimedia, Orlando, FL, 1999.
  • Xi, L., Arce, G. R. and Graveman, R. F. Approximate image message authentication codes. IEEE Trans. Multimedia, 2001, 3(2), 242–252.
  • Queluz, M. P. Authentication of digital images and video: generic models and a new contribution. Signal Process. Image Commun., 2001, 16, 461–475.
  • Lin, C. Y. and Chang, S. F. Robust digital signature for multimedia authentication: a summary. IEEE Trans. Circ. Syst., 2003, 3(4), 23–26.
  • Lu, C. S. and Liao, H. Y. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia, 2003, 5(2), 161–173.
  • Tsa, P., Hu, Y. C. and Chang, C. C. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Commun., 2003, 18, 813–822.
  • Press, W. H., Teukolsky, S. A., Vetterling, W. T. and Flannery, B. P. Numerical Recipes in C: The Art of Scientific Computing, 1992 (Cambridge University Press, Cambridge).
  • Ramponi, G. and Carrat, S. An adaptive irregular sampling algorithm and its application to image coding. Image Vision Comput., 2001, 19(7), 451–460.
  • Seberry, J. and Pieprzk, J. Cryptography: An Introduction to Computer Security, 1989 (Prentice-Hall, New York).
  • Rivest, R. L., Shami, A., and Adlema, L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 1978, 21, 120–126.
  • Cheng, H. and L, X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process., 2000, 48(8), 2439–2451.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.