A secure image authentication algorithm with pixel-level tamper localization
In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any...
Saved in:
Published in | 2004 International Conference on Image Processing, 2004. ICIP '04 Vol. 3; pp. 1573 - 1576 Vol. 3 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
Piscataway NJ
IEEE
2004
|
Subjects | |
Online Access | Get full text |
ISBN | 0780385543 9780780385542 |
ISSN | 1522-4880 |
DOI | 10.1109/ICIP.2004.1421367 |
Cover
Abstract | In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any changes to a signal. It consists of two mechanisms dedicated to authenticity verification for a signal and localization of tampered pixels, respectively. The scheme is secure yet it maintains the fine tamper localization capability of a pixel-wise scheme. Experimental results show that the proposed scheme has a good accuracy in locating tampered pixels. |
---|---|
AbstractList | In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any changes to a signal. It consists of two mechanisms dedicated to authenticity verification for a signal and localization of tampered pixels, respectively. The scheme is secure yet it maintains the fine tamper localization capability of a pixel-wise scheme. Experimental results show that the proposed scheme has a good accuracy in locating tampered pixels. |
Author | Fuzong Lin Zhu, B.B. Shipeng Li Jinhai Wu |
Author_xml | – sequence: 1 surname: Jinhai Wu fullname: Jinhai Wu organization: State Key Lab of Intelligent Tech. & Syst., Tsinghua Univ., Beijing, China – sequence: 2 givenname: B.B. surname: Zhu fullname: Zhu, B.B. – sequence: 3 surname: Shipeng Li fullname: Shipeng Li – sequence: 4 surname: Fuzong Lin fullname: Fuzong Lin |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17611743$$DView record in Pascal Francis |
BookMark | eNpFkEtPwzAQhC1RJNrCD0BcfOGYsn7F7rGqoFSqBAc4Vxtn3Rq5SZSkvH49EUXisnvYT7MzM2Gjqq6IsWsBMyFgfrderp9nEkDPhJZC5faMTcA6UM4YrUZsLIyUmXYOLtik694AJAglxmyz4B35Y0s8HnBHHI_9nqo-euxjXXFMu7qN_f7AP4bJm_hJKUv0Ton3eGio5an2mOL3L37JzgOmjq7-9pS9Pty_LB-zzdNqvVxssijB9JlCSS4Ik2tf5ASmLJwNQRkTQqnmpHLjXQmIdvBcGuULhcrMgwGtC5ujVVN2e9JtsBu-hxYrH7tt0w4Z2q-tsLkQVquBuzlxkYj-z6eG1A9I81yD |
ContentType | Conference Proceeding |
Copyright | 2006 INIST-CNRS |
Copyright_xml | – notice: 2006 INIST-CNRS |
DBID | 6IE 6IH CBEJK RIE RIO IQODW |
DOI | 10.1109/ICIP.2004.1421367 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present Pascal-Francis |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences |
EndPage | 1576 Vol. 3 |
ExternalDocumentID | 17611743 1421367 |
Genre | orig-research |
GroupedDBID | 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI M43 OCL RIE RIL RIO RNS AAVQY IQODW |
ID | FETCH-LOGICAL-i205t-3a2e8f1564cb6e05db87ff355ffd39e365c8d0aa7522d53cb3a359f5044b76a73 |
IEDL.DBID | RIE |
ISBN | 0780385543 9780780385542 |
ISSN | 1522-4880 |
IngestDate | Sun Oct 22 16:06:35 EDT 2023 Tue Aug 26 18:49:18 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Keywords | Safety Image processing Localization Oracle Modeling Authentication |
Language | English |
License | CC BY 4.0 |
LinkModel | DirectLink |
MeetingName | 2004 International Conference on Image Processing (ICIP 2004) |
MergedId | FETCHMERGED-LOGICAL-i205t-3a2e8f1564cb6e05db87ff355ffd39e365c8d0aa7522d53cb3a359f5044b76a73 |
ParticipantIDs | pascalfrancis_primary_17611743 ieee_primary_1421367 |
PublicationCentury | 2000 |
PublicationDate | 20040000 2004 |
PublicationDateYYYYMMDD | 2004-01-01 |
PublicationDate_xml | – year: 2004 text: 20040000 |
PublicationDecade | 2000 |
PublicationPlace | Piscataway NJ |
PublicationPlace_xml | – name: Piscataway NJ |
PublicationTitle | 2004 International Conference on Image Processing, 2004. ICIP '04 |
PublicationTitleAbbrev | ICIP |
PublicationYear | 2004 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020131 ssj0000454093 |
Score | 1.6353207 |
Snippet | In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised... |
SourceID | pascalfrancis ieee |
SourceType | Index Database Publisher |
StartPage | 1573 |
SubjectTerms | Applied sciences Artificial intelligence Asia Authentication Computer science; control theory; systems Exact sciences and technology Gray-scale Intelligent systems Pattern recognition. Digital image processing. Computational geometry Pixel Signal design Watermarking |
Title | A secure image authentication algorithm with pixel-level tamper localization |
URI | https://ieeexplore.ieee.org/document/1421367 |
Volume | 3 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-AkydUMOIH6cGjG9u6rtvREAkaMRwk4UbatdVFGARGYvzr7dsKqPHgbcuybHt93fu9r99D6MbsIYMDEu3wiAon1Ew5ceorx1guJo3fnIYcupFHz9FwEj5O6bSGbve9MEqpsvhMuXBY5vLlMt1CqKznhwEwjNVR3ahZ1au1j6eUVHKHnsgAeGRKrlTjbIGSli57DHkwGhLLvLM7D2y60_eS3kP_YVy6ja59mh27AkWTfGPkpquBF9-s0KCJRrv3r4pP3t1tIdz08xe1438_8Bi1D_1-eLy3ZCeopvJT1LQAFdvtv2mhpzu8gfi8wtnC_Icwh_L4vLBhP8znr8t1VrwtMER38Sr7UHNnDlVJuOAGnq9xaTlt52cbTQb3L_2hY8cxOFng0cIhPFCxBnKZVETKo1LETGuDV7SWJFEkomksPc6ZEbmkJBWEE5po6oWhYBFn5Aw18mWuzhEmRvCBNEjCFzJMGOcJN8ANpgMymRoPrYNaIJzZqmLcmFm5dFD3xxocrrPIB9fq4u_7LtFRVXADkZMr1CjWW3VtsEQhuqUSfQGiHMEu |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsBUPkX59MBIQhLHcTKiCtRCWzGAxFY5sQ0VbVq1qYT49fgStwXEwJYoiiKfHd9757t3AJfmHzI4INGOiFjqhJorJ8585RjPxaXhzVkosBq514_az-H9C3upwdWqFkYpVSafKRcvy7N8OckWGCq79sMAFcY2YJMZVsGraq1VRKUUk1tXRQaoJFOqpRq6hcu0JO0xnoSxkFrtneV9YA88fS-57rQ6jyVxdO33bOMVTJsUc2M5XbW8-OaH7hrQW46gSj95dxdF6mafv8Qd_zvEHThYV_yRx5Uv24WayvegYSEqsRvAfB-6N2SOEXpFhmOzExGBCfJ5YQN_RIxeJ7Nh8TYmGN8l0-GHGjkjzEsihTAAfUZK32lrPw_g-e72qdV2bEMGZxh4rHCoCFSsUV4mSyPlMZnGXGuDWLSWNFE0YlksPSG4MblkNEupoCzRzAvDlEeC00Oo55NcHQGhxvCBNFjCT2WYcCESYaAb9gfkMjMcrQn7aJzBtNLcGFi7NOH8xxysn_PIR3J1_Pd7F7DVfup1B91O_-EEtqv0G4yjnEK9mC3UmUEWRXpeLqgv_tjEgA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2004+International+Conference+on+Image+Processing%2C+2004.+ICIP+%2704&rft.atitle=A+secure+image+authentication+algorithm+with+pixel-level+tamper+localization&rft.au=Jinhai+Wu&rft.au=Zhu%2C+B.B.&rft.au=Shipeng+Li&rft.au=Fuzong+Lin&rft.date=2004-01-01&rft.pub=IEEE&rft.isbn=9780780385542&rft.issn=1522-4880&rft.volume=3&rft.spage=1573&rft.epage=1576+Vol.+3&rft_id=info:doi/10.1109%2FICIP.2004.1421367&rft.externalDocID=1421367 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1522-4880&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1522-4880&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1522-4880&client=summon |