Robust hash for detecting and localizing image tampering

S Roy, Q Sun - 2007 IEEE international conference on image …, 2007 - ieeexplore.ieee.org
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal
manipulations and distinct queries. Some applications also require the hash to be able to …

Video authentication and tamper detection based on cloud model

C Liang, A Li, X Niu - Third International Conference on …, 2007 - ieeexplore.ieee.org
Video authentication has gained more and more attention in recent years. However, many
existed authentication methods have their obvious drawbacks. In this paper, we propose a …

[PDF][PDF] Robust visual identifier using the trace transform

P Brasnett, MZ Bober - Proc. of IET visual information engineering …, 2007 - Citeseer
This paper introduces an efficient image identification method designed to be robust to
various image modifications such as scaling, rotation, compression, flip and grey scale …