Abstract
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication. Methods are classified according to the service they provide, that is strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations. Furthermore, we introduce the concept of image content and discuss the most important requirements for an effective image authentication system design. Different algorithms are described and we focus on their comparison according to the properties cited above.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Akkar ML, Giraud C (2001) An implementation of DES and AES, secure against some attacks. In: Cryptographic hardware and embedded systems—CHES 2001. Proceedings on the third international workshop. Lecture notes in computer science, vol 2162. Paris, France, pp 309–318
Antonini M, Barlaud M, Mathieu P, Daubechies I (1992) Image coding using wavelet transform. IEEE Trans Image Process 1:205–220
Arjen K (1996) Generating standard DSA signatures without long inversion. In: Advances in cryptology—ASIACRYPT’96. Proceedings on the international conference on the theory and applications of cryptology and information security, Kyongju, Korea. Lecture notes in computer science, vol 1163. Springer, pp 57–64
Aucsmith D (ed) (1998) Information hiding. Proceedings of the second international workshop, Portland, Oregon, USA. Lecture notes in computer science, vol 1525. Springer, pp 306–318
Baldoza A, Sieffert M (2000) Methods for detecting tampering in digital images. AFRL Technology Horizons® 1(1):15–17
Bernd J (1993) Digital image processing: concepts, algorithms, and scientific applications. Springer, Berlin, Allemagne
Bhattacharjee S, Kutter M (2000) Compression tolerant image authentication. In: Proceedings of the ICIP-98, vol 1. Chicago, pp 435–439
Bhattacharya D, Sinha S (1997) Invariance of stereo images via the theory of complex moments. Pattern Recogn 30(9):1373–1386
Brassard G (1993) Cryptologie contemporaine. Masson, Paris
Byun SC, Lee IL, Shin TH (2002) A public key based watermarking for color image authentication. In: Proceedings of the IEEE international conference on multimedia and expo, vol 1. Piscataway, NJ, USA, pp 593–600
Canny JF (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679–698
Chang G, Yu SB, Vetterli M (2000) Adaptive wavelet thresholding for image de-noising and compression. IEEE Trans Image Process 9(9):1532–1546
Chen T, Wang J, Zhou Y (2000) Combined digital signature and digital watermark scheme for image authentication. In: Proceedings of the ICII2001, vol 5, pp 78–82
Choonsik P, Kaoru K (1996) New ElGamal type threshold digital signature scheme. IEICE Trans Fundam Electron Commun Comput Sci 1:86–93
Cover TM, Thomas JA (1991) Elements of information theory. Wiley, New York, NY
Cox IJ, Linnartz MG (1997) Public watermarks and resistance to tampering. In: Proceedings of the ICIP’97, Santa Barbara, California, USA
Culik K, Kari J (1997) Finite state transformations of images. Computer and Graphics 34:151–166
Culik K, Valenta V (1997) Generalized finite automata and transducer. J Autom Lang Comb 2:3–17
Darnell D (1999) PGP or PKI? The future of Internet security. EDI Forum: The Journal of Electronic Commerce 12(1):59–62
Dittmann J, Steinmetz A (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems, vol II. Florence, Italy, pp 209–213
Dodgson NA (1997) Quadratic interpolation for image resampling. IEEE Trans Image Process 6(9):1322–1326
Dugelay J-L, Rey C (2002) Un panorama des Méthodes de Tatouage Permettant d’Assurer un Service d’Intégrité. Revue Traitement du Signal 18(4), France
Eierman M, Niederman A, Adams FC (1995) DSS theory: a model of constructs and relationships. Decis Support Syst 14(1):1–26
Evertse J-H, Van-Heyst E (1992) Which new RSA-signatures can be computed from certain given RSA-signatures? J Cryptol 5(1):41–52
Faical A, Mersereau R (2001) Secure fragile digital watermarking technique for image authentication. In: Proceedings of the IEEE international conference on image processing, vol 3. Thessaloniki, pp 1031–1034
Feng W, Liu Z-Q (2004) Bayesian structural content abstraction for image authentication. In: Proceedings of the third international conference on machine learning and cybernetics. Shanghai, 2004
FIPS PUB XX (1993) Digital signature standard
Fowler B, Arps R, ElGamal A (1995) Quadtree based JBIG compression. In: Proceedings of the IEEE data compression conference, pp 102–111
Fridrich J (1998a) Image watermarking for tamper detection. In: Proceedings of the ICIP’98, Chicago, USA
Fridrich J (1998b) Methods for tamper detecting in digital images. In: Proceedings of the 6th IEEE international workshop on intelligent signal processing and communication systems (ISPACS ’98), Melbourne, Australia
Fridrich J (1999a) Methods for tamper detection in digital images. In: Proceedings of the multimedia and security workshop at ACM multimedia ’99, ACM, Orlando, FL, USA, pp 29–33
Fridrich J (1999b) Robust bit extraction from images ICMCS’99, Florence, Italy
Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication/watermark for images. In: Proceedings of the ICIP’2000, Vancouver, Canada
Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: Proceedings of the SPIE, security and watermarking of multimedia contents, San Jose, California, January 23–26, 2001
Fridrich J, Goljan M (1999a) Protection of digital images using self embedding. In: Proceedings of the symposium on content security and data hiding in digital media, Institute of Technology, New Jersey, USA
Fridrich J, Goljan M (1999b) Images with self-correcting capabilities. In: Proceedings of the IEEE international conference on image processing, vol 3. Kobe, Japan, pp 792–796
Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910
Gao Q, Li R, Wang H (2004) Spread spectrum digital watermarking algorithm using gold codes. Journal of Xi’an Jiaotong University 38(2):119–123
Gennaro R, Jarecki S, Krawczyk H (1996) Robust threshold DSS signatures. Advances in cryptology—EUROCRYPT ’96. In: Proceedings on the international conference on the theory and application of cryptographic techniques. Lecture notes in computer science, vol 1070. Springer, pp 354–71
Goljan M, Fridrich JJ, Du R (2002) Distortion-free data embedding for images. In: Proceedings of the 4th international workshop on information hiding, April 25–27, 2001, pp 27–41
Gonzalez RC, Woods RE (2002) Digital image processing. Prentice-Hall, Upper Saddle River, NJ
Grossmann A, Morlet J (1987) Decomposition of function into wavelets of constant shape and related transforms. In: Streit L (ed) Mathematics and physics, lectures on recent results. World Scientific
Hai Pang H, Sweeney P, Paffett J (1998) Extended Kasami algorithm for cyclic codes. In: Proceedings of the IEEE GLOBECOM 1998 (Cat. no. 98CH36250), vol 5. Sydney, Australia, pp 2834–2839
Hampel H, Arps R, Chamzas C (1992) Technical features of the JBIG standard for progressive bi-level image compression. Signal Process Image Commun 4(2):103–111
Harn L (1994) New digital signature scheme based on discrete logarithm. Electron Lett 30(5):396–398
Harry A (1992) VDM specification of the MD4 message digest algorithm. Nat Phys Lab Teddington, UK, NPL DITC 204/92
Helleseth T, Kumar V (1994) The weight hierarchy of the Kasami codes. In: Proceedings of the 1994 IEEE international symposium on information theory (Cat. no. 94CH3467-8), p 308
Holliman M, Memon N (1997) Counterfeiting attacks on oblivious block-wise independant invisible watermarking schemes. IEEE Trans Image Process 6:432–441
Hu Y, Han D-Z (2005) Using two semi fragile watermark for image authentication. In: Proceedings of the international conference on machine learning and cybernetics, vol 9. Guangzhou, pp 5484–5489
Inoue H, Miyazaki A, Katsura T (2000) A digital watermark for images using the wavelet transform. Integr Comput Aided Eng 7(2):105–115
Inoue T, Murakami T, Inomoto K (1997) Evaluation of image symmetry using 3rd order moments. Bulletin of Aichi Institute of Technology Part B 32:177–82
Johnson NF, Katezenbeisser SC (1999) A survey of steganographic techniques. In: Katzenbeisser SC et al. (eds) Information techniques for steganography and digital watermarking. Artec House, Northwood, MA, pp 43–75
Kailasanathan C, Safavi-Naini R, Ogunbona P (2001) Image authentication surviving acceptable modifications. IEEE-EURASIP, workshop on nonlinear signal and image processing
Knudsen LR, Xuejia L (1998) Attacks on fast double block length hash functions. J Cryptol 11(1):59–72
Kostopoulos I, Christodou-lakis D, Skodras AN (2001) Self-authentication of colour images. In: Proceedings of the European conference on electronic imaging and visual arts, Florence, Italy
Kostopoulos I, Gilani SAM, Skodras AN (2002) Colour image authentication based on a self-embedding technique. In: Proceedings of the 14th international conference on digital signal processing (DSP2002) vol 2, Santorini, Greece, pp 733–736
Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180
Kutter M, Jordan F, Bossen F (1998) Digital watermaking of color images using amplitude modulation. J Electron Imaging 7(2):326–332
Kutter M, Voloshynocskiy S, Herrigel, A (2000) The watermark copy attack. In: Proceedings of SPIE security and watermarking of multimedia content II, vol 3971, San Jose, California, USA
Lambrecht C (1996) Perceptual models and architectures for video coding applications. Ph.D. thesis no 1520, Ecole Polytecnique Federale De Lausanne, Switzerland
Lampson B, Rivest R (1997) Cryptography and information security group research project: a simple distributed security infrastructure. Technical report, MIT
Langelaar G, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. IEEE Signal Process Mag 17:20–43
Lee S, Jang D, Yoo CD (2005) An SVD-based watermarking method for image content authentication with improved security. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, vol 2, pp 525–528
Leest A, Veen M, Bruekers F (2003) Reversible image watermarking. In: Proceedings of the ICIP’03, vol 2, September 2003, pp 731–734
Li N, Wenliang D, Boneh D (2003) Oblivious signature-based envelope. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, vol 22, pp 182–189
Liang S, Rangayyan RM (1997) Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6(2):198–207
Liehua X, Gonzalo, R, Lewis AA (2000) Image enhancement towards soft image authentication. In: Proceedings of the IEEE international conference on multimedia and expo (I), pp 497–500
Lin CY, Chang SF (1997) A robust image authentication method distinguishing JPEG compression from malicious manipulation. CU/CTR Technical Report 486-97-19
Lin CY, Chang SF (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of the SPIE security and watermarking of multimedia content
Lin CY, Chang SF (2001) SARI: self-authentication-and-recovery image watermarking system. ACM Multimedia, Ottawa, Canada
Lin ET, Christine I, Podilchuk B, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, San Jose, CA, USA
Lin CY, Sow D, Chang SF (2001) Using self-authentication-and-recovery for error concealment in wireless environments. In: Proceedings of SPIE, vol 4518
Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95
Liu B, Wang X (2000) ECC performance evaluation for MDFE read channel. Chin J Electron 9(2):144–148
Liu H, Zhang Q, Wu J (2003) Trust issues in PGP and solutions. Journal of Beijing University of Aeronautics and Astronautics 29(3):278–282
Liu T, Hu X, Dai Y (2004) Semi fragile watermarking for image content authentication. In: Proceedings on the international conference on signal processing, vol 3, pp 2342–2345
Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46:31–39
Lu C-S (2000) Structural digital signature for image authentication: an incidental distortion resistant scheme. In: Proceedings of the ACM multimedia workshops, pp 115–118
Lu H, Shen R, Chung F-L (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898–900
Lu Z-M, Liu C-H, Xu D-G (2003) Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett 39(1):35–36
Lu Z-M, Xu D-G, Sun S-H (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process. 14(6):822–831
Manjunath BS, Shekhar C, Chellappa R (1996) A new approach to image feature detection with applications. Pattern Recogn 31:627–640
Marvel LM, Boncelet CG (1999) Spread spectrum image steganography. IEEE Trans Image Process 8:1075–1083
Marvel LM, Hartwig GW (2000) Compression compatible fragile and semi fragile tamper detection. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents, vol 2, p 3971
Matsuo T, Kaoru K (2004) On parallel hash functions based on block-ciphers. In: Proceedings of the IEICE transactions on fundamentals of electronics, communications and computer sciences, pp 67–74
Memon N, Fridrich, J (2000) Attack on a fragile watermarking scheme. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents, San Jose, California
Memon ND, Fridrich J (2000) Further attacks on the Yeung–Mintzer fragile watermark. In: Proceedings of the SPIE international conference on security and watermarking of multimedia content II, vol 3971, San Jose, California, USA
Memon N, Fridrich J, Goljan M (2000) Further attacks on Yeung–Mintzer watermarking scheme. In: Proceedings of the SPIE international conference on electronic imaging 2000, San Jose, USA
Memon N, Poorvi V, Boon-Lock Y, Yeung M (2000) Distortion bounded authentication techniques. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, pp 164–174
Meyer Y (1990) Ondelette, in ondelette et operateurs. Hermann
Min-Shiang H, Jui-Lin L, Iuon-Chang L (2003) A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowl Data Eng 15(6):1552–1560
Mintzer F, Braudaway G, Yeung M (1998) Effective and ineffective digital watermarks. In: Proceedings of the ICIP’97, Santa Barbara, CA, USA
Mohand M, Mesbah A (1997) Apprendre et Maîtriser MATLAB, Springer
Monga V, Vats D, Evans BL (2005) Image authentication under geometric attacks via structure matching. In: Proceedings of the IEEE international conference on multimedia and expo (ICME 2005), pp 229–232
Naccache D, M’raïhi D, Vaudenay S, Raphaeli D (1995) Can DSA be improved? Complexity trade-offs with the digital signature standard. In: Proceedings of advances in cryptology—EUROCRYPT ’94. Workshop on the theory and application of cryptographic techniques, pp 77–85
Niho Y (1972) Multi-valued cross-correlation functions between two maximal linear recursive sequence. Ph.D. dissertation, Department of Electrical Engineering, University of Southern California
Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62–66
Paquet AH, Ward RK (2002) Wavelet-based digital watermarking for image authentication. In: Proceedings of the IEEE Canadian conference on electrical and computer engineering, vol I. Winnipeg, Manitoba, Canada, pp 879–884
Pennebarker WP, Mitchell JL (1993) JPEG: still image data compression standard. Van Nostrand Reinhold
Petitcolas FAP, Anderson RJ, Kuhn MG (1993) Attacks on copyright marking systems. In Aucsmith, pp 218–238
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding. A survey. In: Proceedings of the IEEE special issue on protection of multimedia content, vol 87, pp 1062–1078
Pfitzmann B (1996) Digital signature schemes: general framework and fail-stop signatures. Lecture notes in computer science, vol 1100. Springer, Berlin, Allemagne
Queluz MP (1998) Towards robust content based techniques for image authentication. In: Proceedings of IEEE signal processing society 1998 workshop on multimedia signal processing
Queluz MP (1999) Content-based integrity protection of digital images. In: Proceedings of the SPIE conference on security and watermarking of multimedia contents, vol 3657. San Jose California, USA, pp 85–93
Queluz MP, Salema C (1990) Compression factor and error sensitivity of the modified READ method. Communication, control and signal processing. In: Proceedings of the 1990 Bilkent international conference on new trends in communication, control and signal processing, vol 2, pp 1446–1452
Radhakrishnan R, Memon N (2002) On the security of the SARI image authentication system. IEEE Trans Circuits Syst Video Technol 2:440–443
Rao K, Yip RP (1990) Discrete cosine transform: algorithms, advantages, applications. Academic, New York
Raveendran P, Ornatu S, Chew P (1997) New technique to derive invariant features for unequally scaled images. In: Proceedings of the IEEE international conference on systems, man and cybernetics, vol 4, pp 3158–3163
Rivest R (1992) The MD4 message digest algorithm. RFC 1320, MIT and RSA Data Security, Inc
Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Roe M (1994) Performance of symmetric ciphers and one-way hash functions. Fast software encryption. In: Proceedings of the Cambridge security workshop, pp 83–89
Rogier N, Chauvaud P (1997) MD2 is not secure without the checksum byte. Designs Codes Cryptogr 12(3):245–251
Rosario G, Krawczyk H (2000) RSA-based undeniable signatures. J Cryptol 13(4):397–416
Rothaus O (1993) Modified gold codes. IEEE Trans Inf Theory 39(2)654–656
Sanchez-Avila C, Sanchez-Reillol R (2001) The Rijndael block cipher (AES proposal): a comparison with DES. In: Proceedings of the IEEE 35th annual 2001 international Carnahan conference on security technology, pp 229–234
Sarwate DV, Pursley MB (1980) Crosscorrelation properties of pseudorandom and related sequences. Proc IEEE 68:593–619
Sayrol EJ, Cabanillas VS (1999) Optimum watermark detection for color images. In: Proceedings of the IEEE international conference on image processing, vol 2, pp 231–235
Schneider M, Chang S-F (1996) A robust content based digital signature for image authentication. In: Proceedings of the IEEE international conference on image processing, pp 227–230
Sergio D, Servetto KR, Orchard MT (1999) Image coding based on morphological representation of wavelet data. IEEE Trans Image Process 8(9):1161–1174
Sherif, NE-D, Mansour M (2002) Fragile and semi-fragile image authentication based on image self-similarity image processing. In: Proceedings of the international conference on image processing, vol 2, pp 897-900
Shin JB, Lee K, Shim K (2002) New DSA-verifiable signcryption schemes. In: Proceedings of the 5th international conference on information security and cryptology—ICISC 2002. Lecture notes in computer science, vol 2587. Springer, pp 35–47
Skala V, Kucha M (2001) The hash function and the principle of duality. In: Proceedings of the computer graphics international, vol 200, pp 167–174
Stallings W (1994) SHA: the secure hash algorithm. Dr. Dobb’s Journal of Software Tools 19(4):32–34
Storck D (1996) A new approach to integrity of digital images. In: Proceedings of the IFIP conference on mobile communication, pp 309–316
Su C, Wang J (1993) ECCSyn. A synthesis tool for ECC circuits. In: Proceedings of the IEEE international symposium on circuits and systems, vol 3, pp 1706–1709
Sun Q, Chang SF (2002) Semi-fragile image authentication using generic wavelet domain features and ECC. In: Proceedings of the ICIP
Sun Q, Chang SF (2005) A secure and robust digital signature scheme for JPEG 2000 image authentication. IEEE Trans Multimedia 7(3):480–494
Tanaka K, Nakamura Y, Matsui K (1990) Duplex modified-READ coding scheme for facsimile transmission of documents. Electron Commun Jpn Part 1 Commun 73(5):46–56
Tancevski L, Bazgaloski L, Andonovic I (1994) Incoherent asynchronous optical CDMA using gold codes. Electron Lett 30(9):721–723
Tang S, Li J-T, Zhang Y-D (2005) SSF fingerprint image authentication: an incidental distortion resistant scheme. In: Proceedings of ACM international conference on multimedia, November 2005
Taubman D, Marcellin S, Michael W (2002) JPEG2000: image compression fundamentals, standards, and practice. Kluwer, Boston
The Mathworks Inc. image processing toolbox. User’s guide. Version 3
Tian J (2002) Reversible watermarking by difference expansion. In: Proceedings of workshop on multimedia and security, December 2002, pp 19–22
Tirkel AZ, Rankin GA, Schyndel van RG, Osborne CF (1993) Electronic watermark. DICTA-93. Macquarie University, Sydney, Australia, pp 666–672
Trappe W, Washington LC (2002) Introduction to cryptography: with coding theory. Prentice-Hall, Upper Saddle River, NJ
Tsai WH (1985) Moment-preserving thresholding: a new approach. Comput Vis Graph Image Process 29:377–393
Tsuyoshi T (2004) A fast RSA-type public-key primitive modulo pkq using Hensel lifting. IEICE Trans Fundam Electron Commun Comput Sci E87-A(1):94–101
Tzeng CH, Tsai WH (2001) A new technique for authentication of image/video for multimedia applications. In: Proceedings of ACM multimedia workshops—multimedia and security: new challenges, Ottawa, Ontario, Canada
van Renesse RL (1998) Optical security and counterfeit deterrence techniques II, vol 3314, San Jose, California, USA
van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of the IEEE international conference on image processing, vol 2, pp 86–90
Venkatesan R, Koon S, Jakubowski M (2000) Robust image hashing. In: Proceedings of the IEEE international conference on image processing, vol 3, pp 664–666
Walton S (1995) Information authentication for a slippery new age. Dr Dobb’s J 20(4):18–26
Wang X, Liu B (2002) A new ECC/RLL coding scheme. Chin J Electron 11(2):186–191
Wigderson A (1994) Wonders of the digital envelope—a crash course in modern cryptography. In: Proceedings of the IFIP transactions A: computer science and technology, n A-51, technology and foundations, pp 235–238
Wolfgang RB, Delp EJ (1997) Techniques for watermarking digital imagery: further studies. In: Proceedings of the international conference on imaging science, systems, and technology, vol 1. Las Vegas, Nevada, USA, pp 279–287
Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: Proceedings of the IEEE international conference on image processing, vol 3, pp 219–222
Wong PW (1998a) A watermark for image integrity and ownership verification. In: Proceedings of the IS&T PIC conference, Portland, OR, USA
Wong PW (1998b) A public key watermark for image verification and authentication. In: Proceedings of the ICIP, Chicago, IL, USA
Wong PW, Delp EJ (1999) Security and watermarking of multimedia contents, vol 3657. San Jose, California, USA, pp 204–213
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601
Wu CW (2001) Limitations and requirements of content based multimedia authentication systems. In: Proceedings of the IS&T/SPIE’s international symposium on electronic imaging: science and technology, San Jose, CA, vol 4314, pp 241–252
Wu CW (2002) On the design of content based multimedia authentication systems. IEEE Trans Multimedia 4(3):385–393
Xiaotie D, Chan L, Huafei Z (1999) A proposal for secure hash algorithm. In: Proceedings of the 1999 international workshop on cryptographic techniques and e-commerce, pp 254–258
Xie L, Arce GR (1998a) A blind content based digital image signature. In: Proceedings of the second annual fedlab symposium on ATIRP
Xie L, Arce GR, (1998b) A blind wavelet based digital signature for image authentication. In: Proceedings of the EUSIPCO-98
Xie L, Arce GR (1998c) Joint wavelet compression and authentication watermarking. In: Proceedings of the ICIP’98
Xie L, Lewis A (2000) Methods for soft image/video authentication. In: Proceedings of the 4th annual fedlab symposium on ATIRP
Yeung MM (1998) Digital watermarking introduction. Commun ACM 41(7):31–33
Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of the ICIP‘97, Santa Barbara, CA
Yu S, Hu Y, Zhou J (2004) Content based watermarking scheme for image authentication. In: Proceedings of the control, automation, robotics and vision conference 2004, vol 2, pp 1083–1087
Zheng Q, Chellappa R (1993) A computational vision approach to image registration. IEEE Trans Image Process 2(3):311–326
Zhu B, Tewfik AH, Gerek ON (1995) Low bit rate near-transparent image coding. SPIE Conf on Wavelet Application II 2491:173–184
Zhu B, Swanson MD, Tewfik AH (1996) Transparent robust authentication and distortion measurement technique for images. IEEE digital signal processing workshop (DSP 96)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Haouzia, A., Noumeir, R. Methods for image authentication: a survey. Multimed Tools Appl 39, 1–46 (2008). https://doi.org/10.1007/s11042-007-0154-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-007-0154-3