Image authentication and tamper proofing using mathematical morphology | IEEE Conference Publication | IEEE Xplore