Compression tolerant image authentication

Abstract
It is straightforward to apply general schemes forauthenticating digital data to the problem of authenticatingdigital images. However, such a scheme wouldnot authenticate images that have undergone lossycompression, even though they may not have been manipulatedotherwise. In this paper we propose a schemefor authenticating the visual content of digital images.This scheme is robust to compression noise, but willdetect deliberate manipulation of the image-data. Theproposed scheme is...

This publication has 5 references indexed in Scilit: