Open Access   Article Go Back

Study On Image Authentication Techniques

Vinitha.C 1 , Dr.M.Azath 2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-12 , Page no. 87-89, Dec-2014

Online published on Dec 31, 2014

Copyright © Vinitha.C , Dr.M.Azath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vinitha.C , Dr.M.Azath, “Study On Image Authentication Techniques,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.87-89, 2014.

MLA Style Citation: Vinitha.C , Dr.M.Azath "Study On Image Authentication Techniques." International Journal of Computer Sciences and Engineering 2.12 (2014): 87-89.

APA Style Citation: Vinitha.C , Dr.M.Azath, (2014). Study On Image Authentication Techniques. International Journal of Computer Sciences and Engineering, 2(12), 87-89.

BibTex Style Citation:
@article{_2014,
author = {Vinitha.C , Dr.M.Azath},
title = {Study On Image Authentication Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {87-89},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=339},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=339
TI - Study On Image Authentication Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Vinitha.C , Dr.M.Azath
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 87-89
IS - 12
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3580 3392 downloads 3506 downloads
  
  
           

Abstract

Image authentication is the process of proving an image, is an accurate representation of the original one. Image authentication techniques have recently gained great attention due to its importance of multimedia applications. Through non-secure channels like internet digital images are increasingly transferred. Several methods which include Fragile Water-marking, Semi Fragile Water-Marking, Conventional Cryptography are used to protect the authenticity of images. Methods are classified according to the service they provide, that is strict authentication, localization, selective authentication, tamper detection and reconstruction capabilities and robustness against different desired image processing operation. The main aim of the paper is to present a survey and comparison of emerging techniques for image authentication.

Key-Words / Index Term

Conventional Cryptography , Fragile Water Marking , Image Authentication, Image Contents , Robust Image Hashing , Semi Fragile Water Marking

References

[1] K.M.M. Rao, ―Overview Of Image Processing , Medical Image Processing, Proc. of workshop on Medical Image Processing and Applications, 8th October 1995 @ NRSA, Hyderabad-37. 4.
[2] Adil Haouzia & Rita Noumeir, , “Methods of Image Authentication : a Survey,” Published online: 1 August 2007, # Springer Science and Business Media, LLC 2007,Multimedia Tools Appl (2008) 39:1–4.
[3] Reshma Vartak, Smita Deshmukh , “Survey of DigitalImage Authentication Techniques ,” International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637 .
[4] R. B. Wolfgang and E. J. Delp, "Fragile watermarking using the VW2D watermark," in Security and Watermarking of Multimedia content, VOL.3657of SPIE proceedings, January 1999.
[5] C.Y. Lin and S.F. Chang, "Semi-fragile watermarking for authenticating JPEG visual content," in Proc. SPIE International Conf. on Security and Watermarking of Multimedia Contents, VOL. 3971, January 2000.

[6] Book of Angela D’Angelo, Giacomo Cancelli, and Mauro Barni, “Watermark-based Authentication,” .
[7] Gaurav A. Hiware, Rahul D. Chopade, Prof. Manish S. Nimkar , “A Cryptographic Technique using image based Authentication,” http: // www.ijfeat.org (C) International Journal For Engineering Applications and Technology [62-70] , March ISSN 2321-8134.
[8] H. Yang and A. C. Kot, “Binary image authentication with tampering localization by embedding cryptographic signature and block identifier,” IEEE Signal Processing Letters, VOL. 13, Dec. 2006 .
[9] S.Jothimani, P.Betty , “Survey of Image Authentication Techniques,” International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 4- Jan 2014 .
[10] Yan Zhao, Shuozhong Wang, Guorui Feng, Zhenjun Tang,"A Robust Image Hashing Method Based on Zernike Moments ,” Journal of Computational Information Systems6:3(2010) 717-725 .
[11] F. Zernike, Beugungstheorie des schneidenverfahresund seiner verbesserten form[J], der phasenkontrastmethode, Physica, 1934, 1, pp.689-704