Study On Image Authentication Techniques
Keywords:
Conventional Cryptography, Fragile Water Marking, Image Authentication, Image Contents, Robust Image Hashing, Semi Fragile Water MarkingAbstract
Image authentication is the process of proving an image, is an accurate representation of the original one. Image authentication techniques have recently gained great attention due to its importance of multimedia applications. Through non-secure channels like internet digital images are increasingly transferred. Several methods which include Fragile Water-marking, Semi Fragile Water-Marking, Conventional Cryptography are used to protect the authenticity of images. Methods are classified according to the service they provide, that is strict authentication, localization, selective authentication, tamper detection and reconstruction capabilities and robustness against different desired image processing operation. The main aim of the paper is to present a survey and comparison of emerging techniques for image authentication.
References
K.M.M. Rao, ―Overview Of Image Processing , Medical Image Processing, Proc. of workshop on Medical Image Processing and Applications, 8th October 1995 @ NRSA, Hyderabad-37. 4.
Adil Haouzia & Rita Noumeir, , “Methods of Image Authentication : a Survey,” Published online: 1 August 2007, # Springer Science and Business Media, LLC 2007,Multimedia Tools Appl (2008) 39:1–4.
Reshma Vartak, Smita Deshmukh , “Survey of DigitalImage Authentication Techniques ,” International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 .
R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the VW2D watermark," in Security and Watermarking of Multimedia content, VOL.3657of SPIE proceedings, January 1999.
C.Y. Lin and S.F. Chang, "Semi-fragile watermarking for authenticating JPEG visual content," in Proc. SPIE International Conf. on Security and Watermarking of Multimedia Contents, VOL. 3971, January 2000.
Book of Angela D’Angelo, Giacomo Cancelli, and Mauro Barni, “Watermark-based Authentication,” .
Gaurav A. Hiware, Rahul D. Chopade, Prof. Manish S. Nimkar , “A Cryptographic Technique using image based Authentication,” http: // www.ijfeat.org (C) International Journal For Engineering Applications and Technology [62-70] , March ISSN 2321-8134.
H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier,” IEEE Signal Processing Letters, VOL. 13, Dec. 2006 .
S.Jothimani, P.Betty , “Survey of Image Authentication Techniques,” International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 .
Yan Zhao, Shuozhong Wang, Guorui Feng, Zhenjun Tang,"A Robust Image Hashing Method Based on Zernike Moments ,” Journal of Computational Information Systems6:3(2010) 717-725 .
F. Zernike, Beugungstheorie des schneidenverfahresund seiner verbesserten form[J], der phasenkontrastmethode, Physica, 1934, 1, pp.689-704
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
