DCT and DWT-Based Image Watermarking by Using Subsampling
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
Methods for image authentication: a survey
Multimedia Tools and Applications
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Unconditionally Secure Approximate Message Authentication
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
IEEE Transactions on Circuits and Systems for Video Technology
Statistics- and spatiality-based feature distance measure for error resilient image authentication
Transactions on data hiding and multimedia security II
Robust and efficient authentication of video stream broadcasting
ACM Transactions on Information and System Security (TISSEC)
An extended image hashing concept: content-based fingerprinting using FJLT
EURASIP Journal on Information Security
Error resilient image authentication using feature statistical and spatial properties
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems
Journal of Medical Systems
On the music content authentication
Proceedings of the 20th ACM international conference on Multimedia
Digital Image Authentication: A Review
International Journal of Digital Library Systems
The Journal of Supercomputing
Hi-index | 0.00 |
Recently, a number of authentication schemes have been proposed for multimedia data. The main requirement for such authentication systems is that minor modifications which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two classes depending on the underlying model of image authentication. We look at some of the advantages and disadvantages of these schemes and their relationship with limitations of the underlying model of image authentication. In particular, we study feature-based algorithms and hash-based algorithms. The main disadvantage of feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images with the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic digital signature scheme and inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. We propose a multimedia authentication scheme which combines some of the best features of these two classes of algorithms. The proposed scheme utilizes cryptographic digital signature schemes and the data does not need to be modified in order to be made authenticatable. We show how results in sphere packings and coverings can be useful in the design. Several applications including the authentication of images on CD-ROM and handwritten documents are discussed.