Hash-Based Authentication of Digital Images in Noisy Channels

Author(s):  
Fawad Ahmed ◽  
Amir Anees
1998 ◽  
Vol 27 (2) ◽  
pp. 93-96 ◽  
Author(s):  
C H Versteeg ◽  
G C H Sanderink ◽  
S R Lobach ◽  
P F van der Stelt

1999 ◽  
Vol 28 (2) ◽  
pp. 123-126 ◽  
Author(s):  
E Gotfredsen ◽  
J Kragskov ◽  
A Wenzel
Keyword(s):  

Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


2020 ◽  
Vol 6 (4) ◽  
pp. 183-210
Author(s):  
Erin Nunoda

This article examines YouTube videos (primarily distributed by a user named Cecil Robert) that document so-called dead malls: unpopulated, unproductive, but not necessarily demolished consumerist sites that have proliferated in the wake of the 2008 recession. These works link digital images of mall interiors with pop-song remixes so as to re-create the experience of hearing a track while standing within the empty space; manipulating the songs’ audio frequencies heightens echo effects and fosters an impression of ghostly dislocation. This article argues that these videos locate a potentiality in abandoned mall spaces for the exploration of queer (non)relations. It suggests that the videos’ emphasis on lonely, unconsummated intimacies questions circuitous visions of the public sphere, participatory dynamics online, and the presumably conservative biopolitics (both at its height and in its memorialization) of mall architecture.


2010 ◽  
Vol 69 (19) ◽  
pp. 1681-1702
Author(s):  
V. V. Lukin ◽  
S. K. Abramov ◽  
A. V. Popov ◽  
P. Ye. Eltsov ◽  
Benoit Vozel ◽  
...  

2013 ◽  
Vol 72 (19) ◽  
pp. 1787-1801
Author(s):  
C. M. Vargas-Martinez ◽  
Victor Filippovich Kravchenko ◽  
Vladimir Il'ich Ponomarev ◽  
Juan Carlos Sanchez-Garcia

2020 ◽  
Vol 2020 (4) ◽  
pp. 76-1-76-7
Author(s):  
Swaroop Shankar Prasad ◽  
Ofer Hadar ◽  
Ilia Polian

Image steganography can have legitimate uses, for example, augmenting an image with a watermark for copyright reasons, but can also be utilized for malicious purposes. We investigate the detection of malicious steganography using neural networkbased classification when images are transmitted through a noisy channel. Noise makes detection harder because the classifier must not only detect perturbations in the image but also decide whether they are due to the malicious steganographic modifications or due to natural noise. Our results show that reliable detection is possible even for state-of-the-art steganographic algorithms that insert stego bits not affecting an image’s visual quality. The detection accuracy is high (above 85%) if the payload, or the amount of the steganographic content in an image, exceeds a certain threshold. At the same time, noise critically affects the steganographic information being transmitted, both through desynchronization (destruction of information which bits of the image contain steganographic information) and by flipping these bits themselves. This will force the adversary to use a redundant encoding with a substantial number of error-correction bits for reliable transmission, making detection feasible even for small payloads.


Sign in / Sign up

Export Citation Format

Share Document