Abstract

Abstract This paper is focused on digital image and video authentication, considered as the process of evaluating the integrity of image contents relative to the original picture and of being able to detect, in an automatic way, malevolent content modifications. Generic models, corresponding to current approaches for content integrity evaluation – labeling and watermarking – are described, providing a common basis to compare existing techniques. Two labeling implementations are put forward. The first one is based on second-order image moments. It can be thought of as a low-level approach, where the emphasis is put on computational simplicity. The second one relies on image edges and tackles the problem of image/video integrity evaluation from a semantic, higher-level point of view. The viability of both methods, as a means of protecting the content, is assessed under JPEG and MPEG2 compression and non-authorized image modifications.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.