Table of Contents Author Guidelines Submit a Manuscript
Research Letters in Signal Processing
Volume 2007, Article ID 47549, 5 pages
http://dx.doi.org/10.1155/2007/47549
Research Letter

Image Authentication Using Added Signal-Dependent Noise

Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada M5S 1A8

Received 16 September 2007; Accepted 24 October 2007

Academic Editor: Mark Liao

Copyright © 2007 Xin Cindy Guo and Dimitrios Hatzinakos. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at PubMed
  2. C.-Y. Lin and S.-F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153–168, 2001. View at Publisher · View at Google Scholar
  3. W. Dietl, P. Meerwald, and A. Uhl, “Protection of wavelet-based watermarking systems using filter parametrization,” Signal Processing, vol. 83, no. 10, pp. 2095–2116, 2003. View at Publisher · View at Google Scholar
  4. P. Bas, J.-M. Chassery, and B. Macq, “Geometrically invariant watermarking using feature points,” IEEE Transactions on Image Processing, vol. 11, no. 9, pp. 1014–1028, 2002. View at Publisher · View at Google Scholar · View at PubMed
  5. C.-S. Lu, S.-W. Sun, C.-Y. Hsu, and P.-C. Chang, “Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection,” IEEE Transactions on Multimedia, vol. 8, no. 4, pp. 668–685, 2006. View at Publisher · View at Google Scholar
  6. V. Monga and B. L. Evans, “Perceptual image hashing via feature points: performance evaluation and tradeoffs,” IEEE Transactions on Image Processing, vol. 15, no. 11, pp. 3452–3465, 2006. View at Publisher · View at Google Scholar
  7. A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 215–230, 2006. View at Publisher · View at Google Scholar
  8. J. Fridrich, “Visual hash for oblivious watermarking,” in Proceedings of the 12th Annual Symposium, Electronic Imaging, Security and Watermarking of Multimedia Content II, vol. 3971 of Proceedings of SPIE, pp. 286–294, San Jose, Calif, USA, January 2000.
  9. R. Venkatesan, S.-M. Koon, M. H. Jakubowski, and P. Moulin, “Robust image hashing,” in Proceedings of IEEE International Conference on Image Processing, vol. 3, pp. 664–666, Vancouver, Canada, September 2000.
  10. J. S. Seo, J. Haitsma, T. Kalker, and C. D. Yoo, “A robust image fingerprinting system using the rado transform,” Signal Processing: Image Communication, vol. 19, no. 4, pp. 325–339, 2004. View at Publisher · View at Google Scholar
  11. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  12. A. C. Popescu and H. Farid, “Exposing digital forgeries in color filter array interpolated images,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3948–3959, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  13. J. Lukas, J. Fridrich, and M. Goljan, “Detecting digital image forgeries using sensor pattern noise,” in Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072 of Proceedings of SPIE, San Jose, Calif, USA, January 2006. View at Publisher · View at Google Scholar
  14. P. Campisi, J. C.K. Yan, and D. Hatzinakos, “Signal-dependent film grain noise generation using homomorphic adaptive filtering,” Proceedings of IEE Vision, Image and Signal Processing, vol. 147, no. 3, pp. 283–287, June 2000. View at Publisher · View at Google Scholar
  15. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on copyright marking systems,” in Proceedings of the 2nd International Workshop on Information Hiding (IH '98), pp. 218–238, Portland, Ore, USA, April 1998.