An overview on video forensics
The broad availability of tools for the acquisition and processing of multimedia signals has
recently led to the concern that images and videos cannot be considered a trustworthy …
recently led to the concern that images and videos cannot be considered a trustworthy …
Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
Photoproof: Cryptographic image authentication for any set of permissible transformations
A Naveh, E Tromer - 2016 IEEE Symposium on Security and …, 2016 - ieeexplore.ieee.org
Since the invention of the camera, photos have been used to document reality and to supply
proof of events. Yet today it is easy to fabricate realistic images depicting events that never …
proof of events. Yet today it is easy to fabricate realistic images depicting events that never …
Neural distributed compressor discovers binning
We consider lossy compression of an information source when the decoder has lossless
access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special …
access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special …
Learned Wyner–Ziv compressors recover binning
We consider lossy compression of an information source when the decoder has lossless
access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special …
access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special …
A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map
In this paper, a new gray scale image authentication technique is proposed in the integer
wavelet transform (IWT) domain. Digital images as an extensive media today have a special …
wavelet transform (IWT) domain. Digital images as an extensive media today have a special …
Image alignment based perceptual image hash for content authentication
Perceptual image hash is an emerging technology that is closely related to many
applications such as image content authentication, image forging detection, image similarity …
applications such as image content authentication, image forging detection, image similarity …
Distributed binary detection with lossy data compression
Consider the problem where a statistician in a two-node system receives rate-limited
information from a transmitter about marginal observations of a memoryless process …
information from a transmitter about marginal observations of a memoryless process …
Multiplication by a constant is sublinear
V Dimitrov, L Imbert, A Zakaluzny - 18th IEEE Symposium on …, 2007 - ieeexplore.ieee.org
This paper explores the use of the double-base number system (DBNS) for constant integer
multiplication. The DBNS recoding scheme represents integers-in this case constants in a …
multiplication. The DBNS recoding scheme represents integers-in this case constants in a …
Digital signature verification scheme for image authentication
M Singh, H Kaur, A Kakkar - 2015 2nd International Conference …, 2015 - ieeexplore.ieee.org
Image authentication is one of the security checks to detect any forgery or malicious
manipulations, which may have occurred due to insecure transmission. An effective scheme …
manipulations, which may have occurred due to insecure transmission. An effective scheme …