An overview on video forensics

S Milani, M Fontani, P Bestagini, M Barni… - … Transactions on Signal …, 2012 - cambridge.org
The broad availability of tools for the acquisition and processing of multimedia signals has
recently led to the concern that images and videos cannot be considered a trustworthy …

Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Photoproof: Cryptographic image authentication for any set of permissible transformations

A Naveh, E Tromer - 2016 IEEE Symposium on Security and …, 2016 - ieeexplore.ieee.org
Since the invention of the camera, photos have been used to document reality and to supply
proof of events. Yet today it is easy to fabricate realistic images depicting events that never …

Neural distributed compressor discovers binning

E Ozyilkan, J Ballé, E Erkip - IEEE Journal on Selected Areas in …, 2024 - ieeexplore.ieee.org
We consider lossy compression of an information source when the decoder has lossless
access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special …

Learned Wyner–Ziv compressors recover binning

E Özyılkan, J Ballé, E Erkip - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We consider lossy compression of an information source when the decoder has lossless
access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special …

A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map

MJ Barani, MY Valandar, P Ayubi - Optik, 2019 - Elsevier
In this paper, a new gray scale image authentication technique is proposed in the integer
wavelet transform (IWT) domain. Digital images as an extensive media today have a special …

Image alignment based perceptual image hash for content authentication

X Wang, X Zhou, Q Zhang, B Xu, J Xue - Signal Processing: Image …, 2020 - Elsevier
Perceptual image hash is an emerging technology that is closely related to many
applications such as image content authentication, image forging detection, image similarity …

Distributed binary detection with lossy data compression

G Katz, P Piantanida, M Debbah - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Consider the problem where a statistician in a two-node system receives rate-limited
information from a transmitter about marginal observations of a memoryless process …

Multiplication by a constant is sublinear

V Dimitrov, L Imbert, A Zakaluzny - 18th IEEE Symposium on …, 2007 - ieeexplore.ieee.org
This paper explores the use of the double-base number system (DBNS) for constant integer
multiplication. The DBNS recoding scheme represents integers-in this case constants in a …

Digital signature verification scheme for image authentication

M Singh, H Kaur, A Kakkar - 2015 2nd International Conference …, 2015 - ieeexplore.ieee.org
Image authentication is one of the security checks to detect any forgery or malicious
manipulations, which may have occurred due to insecure transmission. An effective scheme …