Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
The area of non-intrusive forensic analysis has found many applications in the area of digital imaging. One unexplored area is the identification of source coding in digital image...
In the H.264/AVC video coding standard, motion compensation can be performed by partitioning macroblocks into square or rectangular sub-macroblocks in a quadtree decomposition. Th...
Edson M. Hung, Ricardo L. de Queiroz, Debargha Muk...
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
The paper proposes a blind spread spectrum watermarking scheme where watermark information is embedded redundantly in the multilevel wavelet coefficients of the cover image. It ha...