PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations

Assa Naveh
Assa Naveh

IEEE Symposium on Security and Privacy, pp. 255-271, 2016.

Cited by: 26|Bibtex|Views54
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com

Abstract:

Since the invention of the camera, photos have been used to document reality and to supply proof of events. Yet today it is easy to fabricate realistic images depicting events that never happened. Thus, dozens of papers strive to develop methods for authenticating images. While some commercial cameras already attach digital signatures to ...More

Code:

Data:

Your rating :
0

 

Tags
Comments