A secure image authentication algorithm with pixel-level tamper localization
In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any...
Saved in:
| Published in | 2004 International Conference on Image Processing, 2004. ICIP '04 Vol. 3; pp. 1573 - 1576 Vol. 3 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
Piscataway NJ
IEEE
2004
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 0780385543 9780780385542 |
| ISSN | 1522-4880 |
| DOI | 10.1109/ICIP.2004.1421367 |
Cover
| Abstract | In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any changes to a signal. It consists of two mechanisms dedicated to authenticity verification for a signal and localization of tampered pixels, respectively. The scheme is secure yet it maintains the fine tamper localization capability of a pixel-wise scheme. Experimental results show that the proposed scheme has a good accuracy in locating tampered pixels. |
|---|---|
| AbstractList | In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any changes to a signal. It consists of two mechanisms dedicated to authenticity verification for a signal and localization of tampered pixels, respectively. The scheme is secure yet it maintains the fine tamper localization capability of a pixel-wise scheme. Experimental results show that the proposed scheme has a good accuracy in locating tampered pixels. |
| Author | Fuzong Lin Zhu, B.B. Shipeng Li Jinhai Wu |
| Author_xml | – sequence: 1 surname: Jinhai Wu fullname: Jinhai Wu organization: State Key Lab of Intelligent Tech. & Syst., Tsinghua Univ., Beijing, China – sequence: 2 givenname: B.B. surname: Zhu fullname: Zhu, B.B. – sequence: 3 surname: Shipeng Li fullname: Shipeng Li – sequence: 4 surname: Fuzong Lin fullname: Fuzong Lin |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17611743$$DView record in Pascal Francis |
| BookMark | eNpFkEtPwzAQhC1RJNrCD0BcfOGYsn7F7rGqoFSqBAc4Vxtn3Rq5SZSkvH49EUXisnvYT7MzM2Gjqq6IsWsBMyFgfrderp9nEkDPhJZC5faMTcA6UM4YrUZsLIyUmXYOLtik694AJAglxmyz4B35Y0s8HnBHHI_9nqo-euxjXXFMu7qN_f7AP4bJm_hJKUv0Ton3eGio5an2mOL3L37JzgOmjq7-9pS9Pty_LB-zzdNqvVxssijB9JlCSS4Ik2tf5ASmLJwNQRkTQqnmpHLjXQmIdvBcGuULhcrMgwGtC5ujVVN2e9JtsBu-hxYrH7tt0w4Z2q-tsLkQVquBuzlxkYj-z6eG1A9I81yD |
| ContentType | Conference Proceeding |
| Copyright | 2006 INIST-CNRS |
| Copyright_xml | – notice: 2006 INIST-CNRS |
| DBID | 6IE 6IH CBEJK RIE RIO IQODW |
| DOI | 10.1109/ICIP.2004.1421367 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present Pascal-Francis |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences |
| EndPage | 1576 Vol. 3 |
| ExternalDocumentID | 17611743 1421367 |
| Genre | orig-research |
| GroupedDBID | 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI M43 OCL RIE RIL RIO RNS AAVQY IQODW |
| ID | FETCH-LOGICAL-i205t-3a2e8f1564cb6e05db87ff355ffd39e365c8d0aa7522d53cb3a359f5044b76a73 |
| IEDL.DBID | RIE |
| ISBN | 0780385543 9780780385542 |
| ISSN | 1522-4880 |
| IngestDate | Sun Oct 22 16:06:35 EDT 2023 Tue Aug 26 18:49:18 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | Safety Image processing Localization Oracle Modeling Authentication |
| Language | English |
| License | CC BY 4.0 |
| LinkModel | DirectLink |
| MeetingName | 2004 International Conference on Image Processing (ICIP 2004) |
| MergedId | FETCHMERGED-LOGICAL-i205t-3a2e8f1564cb6e05db87ff355ffd39e365c8d0aa7522d53cb3a359f5044b76a73 |
| ParticipantIDs | pascalfrancis_primary_17611743 ieee_primary_1421367 |
| PublicationCentury | 2000 |
| PublicationDate | 20040000 2004 |
| PublicationDateYYYYMMDD | 2004-01-01 |
| PublicationDate_xml | – year: 2004 text: 20040000 |
| PublicationDecade | 2000 |
| PublicationPlace | Piscataway NJ |
| PublicationPlace_xml | – name: Piscataway NJ |
| PublicationTitle | 2004 International Conference on Image Processing, 2004. ICIP '04 |
| PublicationTitleAbbrev | ICIP |
| PublicationYear | 2004 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0020131 ssj0000454093 |
| Score | 1.634053 |
| Snippet | In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised... |
| SourceID | pascalfrancis ieee |
| SourceType | Index Database Publisher |
| StartPage | 1573 |
| SubjectTerms | Applied sciences Artificial intelligence Asia Authentication Computer science; control theory; systems Exact sciences and technology Gray-scale Intelligent systems Pattern recognition. Digital image processing. Computational geometry Pixel Signal design Watermarking |
| Title | A secure image authentication algorithm with pixel-level tamper localization |
| URI | https://ieeexplore.ieee.org/document/1421367 |
| Volume | 3 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6AkydUMOIP0oNHN7p13bqjIRI0YjhIwo20a6uLMAiMxPjX23YF1HjwtmVZtr11e-9973vfA-AGZyLmIadeFmOhExSEPIoF91JCuPbOoaB2fsroOR5OoscpmdbA7b4XRkppyWfSN5u2li-W2dZAZb0gCo3CWB3UExpXvVp7PMVKyR16IkOjI2O1UnWyZRapTdmpqYORCDvlnd1-6MqdAUp7D_2HsU0bfXc1N3bFkCbZRttNVQMvvnmhQROMdvdfkU_e_W3J_ezzl7Tjfx_wGLQP_X5wvPdkJ6Ami1PQdAEqdJ__pgWe7uDG4PMS5gv9H4LM0OOL0sF-kM1fl-u8fFtAg-7CVf4h597csJJgyXR4vobWc7rOzzaYDO5f-kPPjWPw8hCR0sMslFQZcZmMxxIRwWmilI5XlBI4lTgmGRWIsUSbXBCcccwwSRVBUcSTmCX4DDSKZSHPAQxTqlCKuA7G0kgEEedcJipjRmkGKUY7oGWMM1tVihszZ5cO6P54B4fjSRyY1Ori7_MuwVFFuDHIyRVolOutvNaxRMm7dhF9AWfowbw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED0VGGDioyDKR_HASIob24kzogrUQlsxgMRW2bENFaVFbSohfj2247aAGNgSRVHki-W7e_fuHcA5yVUiY8mjPCHKJigYR5woGWWMSeudY8X9_JReP2k_0tsn9lSBi2UvjNbak890w136Wr6a5HMHlV02aewUxtZgg1FKWdmttURUvJjcqisydkoyXi3Vpltum_qknbtKGKMkaO8s7uNQ8Gzi7LLT6tz7xLERvhcGrzjapJhZy5ly5MU3P3SzDb3FCkr6yWtjXshG_vlL3PG_S9yB_VXHH7pf-rJdqOjxHmyHEBWFA2BWhe4VmjmEXqPhmz2JkHAE-XERgD8kRs-T6bB4eUMO30Xvww89ikaOl4QKYQP0KfK-M_R-7sPjzfVDqx2FgQzRMMasiIiINTdOXiaXicZMSZ4aYyMWYxTJNElYzhUWIrUmV4zkkgjCMsMwpTJNREoOYH08GetDQHHGDc6wtOFYRlWTSil1anLhtGawEbwGVWecwXupuTEIdqlB_cc_WD1Pk6ZLro7-fu8MNtsPve6g2-nfHcNWSb9xOMoJrBfTuT61kUUh635DfQG_EMUJ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2004+International+Conference+on+Image+Processing%2C+2004.+ICIP+%2704&rft.atitle=A+secure+image+authentication+algorithm+with+pixel-level+tamper+localization&rft.au=Jinhai+Wu&rft.au=Zhu%2C+B.B.&rft.au=Shipeng+Li&rft.au=Fuzong+Lin&rft.date=2004-01-01&rft.pub=IEEE&rft.isbn=9780780385542&rft.issn=1522-4880&rft.volume=3&rft.spage=1573&rft.epage=1576+Vol.+3&rft_id=info:doi/10.1109%2FICIP.2004.1421367&rft.externalDocID=1421367 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1522-4880&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1522-4880&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1522-4880&client=summon |