Study On Image Authentication Techniques

Authors

  • Vinitha C Department of Computer Science and Engineering, Met’s School of Engineering, Mala, India
  • M Azath Department of Computer Science and Engineering, Met’s School of Engineering, Mala, India

Keywords:

Conventional Cryptography, Fragile Water Marking, Image Authentication, Image Contents, Robust Image Hashing, Semi Fragile Water Marking

Abstract

Image authentication is the process of proving an image, is an accurate representation of the original one. Image authentication techniques have recently gained great attention due to its importance of multimedia applications. Through non-secure channels like internet digital images are increasingly transferred. Several methods which include Fragile Water-marking, Semi Fragile Water-Marking, Conventional Cryptography are used to protect the authenticity of images. Methods are classified according to the service they provide, that is strict authentication, localization, selective authentication, tamper detection and reconstruction capabilities and robustness against different desired image processing operation. The main aim of the paper is to present a survey and comparison of emerging techniques for image authentication.

References

K.M.M. Rao, ―Overview Of Image Processing , Medical Image Processing, Proc. of workshop on Medical Image Processing and Applications, 8th October 1995 @ NRSA, Hyderabad-37. 4.

Adil Haouzia & Rita Noumeir, , “Methods of Image Authentication : a Survey,” Published online: 1 August 2007, # Springer Science and Business Media, LLC 2007,Multimedia Tools Appl (2008) 39:1–4.

Reshma Vartak, Smita Deshmukh , “Survey of DigitalImage Authentication Techniques ,” International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 .

R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the VW2D watermark," in Security and Watermarking of Multimedia content, VOL.3657of SPIE proceedings, January 1999.

C.Y. Lin and S.F. Chang, "Semi-fragile watermarking for authenticating JPEG visual content," in Proc. SPIE International Conf. on Security and Watermarking of Multimedia Contents, VOL. 3971, January 2000.

Book of Angela D’Angelo, Giacomo Cancelli, and Mauro Barni, “Watermark-based Authentication,” .

Gaurav A. Hiware, Rahul D. Chopade, Prof. Manish S. Nimkar , “A Cryptographic Technique using image based Authentication,” http: // www.ijfeat.org (C) International Journal For Engineering Applications and Technology [62-70] , March ISSN 2321-8134.

H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier,” IEEE Signal Processing Letters, VOL. 13, Dec. 2006 .

S.Jothimani, P.Betty , “Survey of Image Authentication Techniques,” International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 .

Yan Zhao, Shuozhong Wang, Guorui Feng, Zhenjun Tang,"A Robust Image Hashing Method Based on Zernike Moments ,” Journal of Computational Information Systems6:3(2010) 717-725 .

F. Zernike, Beugungstheorie des schneidenverfahresund seiner verbesserten form[J], der phasenkontrastmethode, Physica, 1934, 1, pp.689-704

Downloads

Published

2014-12-31

How to Cite

[1]
C. Vinitha and M. Azath, “Study On Image Authentication Techniques”, Int. J. Comp. Sci. Eng., vol. 2, no. 12, pp. 87–90, Dec. 2014.