A Computational Approach to Edge Detection
IEEE Transactions on Pattern Analysis and Machine Intelligence
Discrete cosine transform: algorithms, advantages, applications
Discrete cosine transform: algorithms, advantages, applications
Elements of information theory
Elements of information theory
Which new RSA-signatures can be computed from certain given RSA-signatures?
Journal of Cryptology - Eurocrypt '90
DSS theory: a model of constructs and relationships
Decision Support Systems
Generalized finite automata and transducers
Journal of Automata, Languages and Combinatorics
Md2 is not Secure Without the Checksum Byte
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Communications of the ACM
Structural digital signature for image authentication: an incidental distortion resistant scheme
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SARI: self-authentication-and-recovery image watermarking system
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Digital Signature Schemes: General Framework and Fail-Stop Signatures
Digital Signature Schemes: General Framework and Fail-Stop Signatures
Digital Image Processing: Concepts, Algorithms, and Scientific Applications
Digital Image Processing: Concepts, Algorithms, and Scientific Applications
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Introduction to Cryptography: With Coding Theory
Introduction to Cryptography: With Coding Theory
JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
Security and Watermarking of Multimedia Contents
Security and Watermarking of Multimedia Contents
Proceedings of the Second International Workshop on Information Hiding
Proceedings of the Second International Workshop on Information Hiding
Generating Standard DSA Signatures Without Long Inversion
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Distortion-Free Data Embedding for Images
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Performance of Symmetric Ciphers and One-Way Hash Functions
Fast Software Encryption, Cambridge Security Workshop
The Hash Function and the Principle of Duality
CGI '01 Computer Graphics International 2001
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Robust Bit Extraction from Images
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Quadtree based JBIG compression
DCC '95 Proceedings of the Conference on Data Compression
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
SSF fingerprint for image authentication: an incidental distortion resistant scheme
Proceedings of the 13th annual ACM international conference on Multimedia
A new technique for authentication of image/video for multimedia applications
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
A digital watermark for images using the wavelet transform
Integrated Computer-Aided Engineering
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
New DSA-verifiable signcryption schemes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
On the design of content-based multimedia authentication systems
IEEE Transactions on Multimedia
A secure and robust digital signature scheme for JPEG2000 image authentication
IEEE Transactions on Multimedia
Fault resilient and compression tolerant digital signature for image authentication
IEEE Transactions on Consumer Electronics
Quadratic interpolation for image resampling
IEEE Transactions on Image Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
Image coding based on a morphological representation of wavelet data
IEEE Transactions on Image Processing
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Adaptive wavelet thresholding for image denoising and compression
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
On the security of the digest function in the SARI image authentication system
IEEE Transactions on Circuits and Systems for Video Technology
Tampered region localization of digital color images based on JPEG compression noise
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
An image authentication scheme based on digital watermarking and image secret sharing
Multimedia Tools and Applications
Self-embedding fragile watermarking scheme combined average with VQ encoding
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Rapid blockwise multi-resolution clustering of facial images for intelligent watermarking
Machine Vision and Applications
Hi-index | 0.00 |
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication. Methods are classified according to the service they provide, that is strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations. Furthermore, we introduce the concept of image content and discuss the most important requirements for an effective image authentication system design. Different algorithms are described and we focus on their comparison according to the properties cited above.