Security of an ill-posed operator for image authentication | IEEE Journals & Magazine | IEEE Xplore