Abstract HTML Views: 514 PDF Downloads: 208 Total Views/Downloads: 722
Abstract HTML Views: 339 PDF Downloads: 130 Total Views/Downloads: 469
The IAS based on the robust signature is studied and an improved AMAC (approximate message authentication
code) is proposed. In this method, all the invariable bits of the image block referring to the threshold strength of incidental
manipulation are used to construct AMAC. To locate malicious manipulation, a hierarchical AMAC is constructed. The
robustness under JPEG compression and AWGN is investigated and its effectiveness is demonstrated.