{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T01:43:12Z","timestamp":1772674992475,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,10,8]],"date-time":"2009-10-08T00:00:00Z","timestamp":1254960000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1007\/s10207-009-0093-2","type":"journal-article","created":{"date-parts":[[2009,10,7]],"date-time":"2009-10-07T13:23:41Z","timestamp":1254921821000},"page":"19-32","source":"Crossref","is-referenced-by-count":51,"title":["Content-based image authentication: current status, issues, and challenges"],"prefix":"10.1007","volume":"9","author":[{"given":"Shui-Hua","family":"Han","sequence":"first","affiliation":[]},{"given":"Chao-Hsien","family":"Chu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,8]]},"reference":[{"issue":"2","key":"93_CR1","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TIP.2004.823831","volume":"13","author":"M. Alghoniemy","year":"2004","unstructured":"Alghoniemy M., Tewfik A.H.: Geometric invariance in image watermarking. IEEE Trans. Image Process 13(2), 145\u2013153 (2004)","journal-title":"IEEE Trans. Image Process"},{"key":"93_CR2","doi-asserted-by":"crossref","unstructured":"Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based digital signature for motion pictures authentication and content-fragile watermarking. Proceedings IEEE International Conference on Multimedia Computing and System, vol. 2, pp. 209\u2013213 (1999)","DOI":"10.1109\/MMCS.1999.778274"},{"key":"93_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Visual hash for oblivious watermarking. Proceedings SPIE: Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 286\u2013294 (2000)","DOI":"10.1117\/12.384982"},{"key":"93_CR4","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. Proceedings IEEE International Conference on Information Technology: Coding Computing, pp. 178\u2013183 (2000)","DOI":"10.1109\/ITCC.2000.844203"},{"issue":"3","key":"93_CR5","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M. Holliman","year":"2000","unstructured":"Holliman M., Memon N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemas. IEEE Trans. Image Process. 9(3), 432\u2013441 (2000)","journal-title":"IEEE Trans. Image Process."},{"key":"93_CR6","unstructured":"Holliman, M., Memon, N., Yeung, M.: On the need for image dependent keys for watermarking. Proceedings of the Second Workshop on Multimedia, NJIT (1999)"},{"issue":"8","key":"93_CR7","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"H.S. Kim","year":"2003","unstructured":"Kim H.S., Lee H.K.: Invariant image watermark using Zernike moments. IEEE Trans. Circuits Syst. Video Technol. 13(8), 766\u2013775 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"93_CR8","doi-asserted-by":"crossref","unstructured":"Kozat, S.S., Venkatesan, R., Mih\u00e7ak, M.K.: Robust perceptual image hashing via matrix invariants. Proceedings IEEE International Conference on Image Processing, Singapore, vol. 5, pp. 3443\u20133446 (2004)","DOI":"10.1109\/ICIP.2004.1421855"},{"issue":"2","key":"93_CR9","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"C.Y. Lin","year":"2001","unstructured":"Lin C.Y., Chang S.F.: A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153\u2013168 (2001)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"93_CR10","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/TMM.2003.811621","volume":"5","author":"C.S. Lu","year":"2003","unstructured":"Lu C.S., Liao H.Y.: Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimed. 5(2), 161\u2013173 (2003)","journal-title":"IEEE Trans. Multimed."},{"key":"93_CR11","unstructured":"Lv, X.D., Wang, Z.J.: Fast Johnson\u2013Lindenstrauss transform for robust and secure image hashing. Proceedings IEEE 10th Workshop on Multimedia Signal Processing, October 2008"},{"key":"93_CR12","unstructured":"Malkin, M., Venkatesan, R.: The randlet transform: applications to universal perceptual hashing and image authentication. Proceedings Allerton Conference, Monticello, IL (2004)"},{"issue":"3","key":"93_CR13","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TIFS.2007.902260","volume":"2","author":"Y. Mao","year":"2007","unstructured":"Mao Y., Wu M.: Unicity distance of robust image hashing. IEEE Trans. Inf. Forensics Sec. 2(3), 462\u2013467 (2007)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"93_CR14","doi-asserted-by":"crossref","unstructured":"Mih\u00e7ak, M.K., Venkatesan, R.: New iterative geometric methods for robust perceptual image hashing. Proceedings ACM Workshop Security and Privacy in Digital Rights Management, Philadelphia, PA, November 2001","DOI":"10.1007\/3-540-47870-1_2"},{"issue":"11","key":"93_CR15","doi-asserted-by":"crossref","first-page":"3452","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"V. Monga","year":"2006","unstructured":"Monga V., Evans B.L.: Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans. Image Process. 15(11), 3452\u20133465 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"93_CR16","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V. Monga","year":"2007","unstructured":"Monga V., Mihcak M.K.: Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans. Inf. Forensics Sec. 2(3), 376\u2013390 (2007)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"93_CR17","doi-asserted-by":"crossref","unstructured":"Radhakrisnan, R., Memon, N.: On the security of the SARI image authentication system. Proceedings IEEE International Conference on Image Processing, vol. II, pp. 971\u2013974 (2001)","DOI":"10.1109\/ICIP.2001.958287"},{"issue":"1","key":"93_CR18","first-page":"1","volume":"14","author":"R. Radhakrishnan","year":"2005","unstructured":"Radhakrishnan R., Xiong Z., Memom N.: On the security of the visual hash function. J. Electron. Imaging 14(1), 1\u201310 (2005)","journal-title":"J. Electron. Imaging"},{"issue":"3","key":"93_CR19","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1155\/S1110865702204047","volume":"6","author":"C. Rey","year":"2002","unstructured":"Rey C., Dugelay J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 6(3), 613\u2013621 (2002)","journal-title":"EURASIP J. Appl. Signal Process."},{"key":"93_CR20","doi-asserted-by":"crossref","unstructured":"Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. Proceedings IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 3, pp. 227\u2013230, September 1996","DOI":"10.1109\/ICIP.1996.560425"},{"key":"93_CR21","unstructured":"Signal & Image Processing Institute: The USC-SIPI Image Database. University of Southern California. http:\/\/sipi.usc.edu\/database\/ (2007). Accessed 10 Apr 2007"},{"issue":"8","key":"93_CR22","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1109\/TCSVT.2003.815947","volume":"13","author":"D. Simitopoulos","year":"2003","unstructured":"Simitopoulos D., Koutsonanos D.E., Strintzis M.G.: Robust image watermarking based on generalized radon transformations. IEEE Trans. Circuits Syst. Video Technol. 13(8), 732\u2013745 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"93_CR23","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"1","author":"A. Swaminathan","year":"2006","unstructured":"Swaminathan A., Mao Y., Wu M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Sec. 1(2), 215\u2013230 (2006)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"93_CR24","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. Proceedings IEEE Conference Image Processing, pp. 664\u2013666, September 2000","DOI":"10.1109\/ICIP.2000.899541"},{"key":"93_CR25","unstructured":"Wong, P.W.: A public key watermark for image verification and authentication. Proceedings IEEE ICIP, pp. 425\u2013429 (1998)"},{"issue":"4","key":"93_CR26","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1109\/TMM.2005.846774","volume":"7","author":"Y. Wu","year":"2005","unstructured":"Wu Y.: On the security of an SVD-based ownership watermarking. IEEE Trans. Multimed. 7(4), 624\u2013627 (2005)","journal-title":"IEEE Trans. Multimed."},{"key":"93_CR27","unstructured":"Wu, J., Zhu, B., Li, S., Lin, F.: Efficient Oracle attacks on Yeng- Mintzer and variant authentication schemes. Proceedings of the IEEE International Conference on Multimedia & Expo (ICME\u201904), Taiwan (2004)"},{"key":"93_CR28","doi-asserted-by":"crossref","unstructured":"Xiang, S.J., Kim, H.J., Huang, J.W.: Histogram-based image hashing scheme robust against geometric deformation. The 9th ACM Multimedia and Security Workshop (2007)","DOI":"10.1145\/1288869.1288886"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0093-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0093-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0093-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:25:56Z","timestamp":1739377556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0093-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,8]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["93"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0093-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,8]]}}}