Skip to main content
Log in

Methods for image authentication: a survey

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication. Methods are classified according to the service they provide, that is strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations. Furthermore, we introduce the concept of image content and discuss the most important requirements for an effective image authentication system design. Different algorithms are described and we focus on their comparison according to the properties cited above.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akkar ML, Giraud C (2001) An implementation of DES and AES, secure against some attacks. In: Cryptographic hardware and embedded systems—CHES 2001. Proceedings on the third international workshop. Lecture notes in computer science, vol 2162. Paris, France, pp 309–318

  2. Antonini M, Barlaud M, Mathieu P, Daubechies I (1992) Image coding using wavelet transform. IEEE Trans Image Process 1:205–220

    Article  Google Scholar 

  3. Arjen K (1996) Generating standard DSA signatures without long inversion. In: Advances in cryptology—ASIACRYPT’96. Proceedings on the international conference on the theory and applications of cryptology and information security, Kyongju, Korea. Lecture notes in computer science, vol 1163. Springer, pp 57–64

  4. Aucsmith D (ed) (1998) Information hiding. Proceedings of the second international workshop, Portland, Oregon, USA. Lecture notes in computer science, vol 1525. Springer, pp 306–318

  5. Baldoza A, Sieffert M (2000) Methods for detecting tampering in digital images. AFRL Technology Horizons® 1(1):15–17

    Google Scholar 

  6. Bernd J (1993) Digital image processing: concepts, algorithms, and scientific applications. Springer, Berlin, Allemagne

    Google Scholar 

  7. Bhattacharjee S, Kutter M (2000) Compression tolerant image authentication. In: Proceedings of the ICIP-98, vol 1. Chicago, pp 435–439

  8. Bhattacharya D, Sinha S (1997) Invariance of stereo images via the theory of complex moments. Pattern Recogn 30(9):1373–1386

    Article  Google Scholar 

  9. Brassard G (1993) Cryptologie contemporaine. Masson, Paris

    Google Scholar 

  10. Byun SC, Lee IL, Shin TH (2002) A public key based watermarking for color image authentication. In: Proceedings of the IEEE international conference on multimedia and expo, vol 1. Piscataway, NJ, USA, pp 593–600

  11. Canny JF (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679–698

    Article  Google Scholar 

  12. Chang G, Yu SB, Vetterli M (2000) Adaptive wavelet thresholding for image de-noising and compression. IEEE Trans Image Process 9(9):1532–1546

    Article  MATH  MathSciNet  Google Scholar 

  13. Chen T, Wang J, Zhou Y (2000) Combined digital signature and digital watermark scheme for image authentication. In: Proceedings of the ICII2001, vol 5, pp 78–82

  14. Choonsik P, Kaoru K (1996) New ElGamal type threshold digital signature scheme. IEICE Trans Fundam Electron Commun Comput Sci 1:86–93

    Google Scholar 

  15. Cover TM, Thomas JA (1991) Elements of information theory. Wiley, New York, NY

    MATH  Google Scholar 

  16. Cox IJ, Linnartz MG (1997) Public watermarks and resistance to tampering. In: Proceedings of the ICIP’97, Santa Barbara, California, USA

  17. Culik K, Kari J (1997) Finite state transformations of images. Computer and Graphics 34:151–166

    MATH  MathSciNet  Google Scholar 

  18. Culik K, Valenta V (1997) Generalized finite automata and transducer. J Autom Lang Comb 2:3–17

    MATH  MathSciNet  Google Scholar 

  19. Darnell D (1999) PGP or PKI? The future of Internet security. EDI Forum: The Journal of Electronic Commerce 12(1):59–62

    Google Scholar 

  20. Dittmann J, Steinmetz A (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems, vol II. Florence, Italy, pp 209–213

  21. Dodgson NA (1997) Quadratic interpolation for image resampling. IEEE Trans Image Process 6(9):1322–1326

    Article  Google Scholar 

  22. Dugelay J-L, Rey C (2002) Un panorama des Méthodes de Tatouage Permettant d’Assurer un Service d’Intégrité. Revue Traitement du Signal 18(4), France

  23. Eierman M, Niederman A, Adams FC (1995) DSS theory: a model of constructs and relationships. Decis Support Syst 14(1):1–26

    Article  Google Scholar 

  24. Evertse J-H, Van-Heyst E (1992) Which new RSA-signatures can be computed from certain given RSA-signatures? J Cryptol 5(1):41–52

    Article  MATH  MathSciNet  Google Scholar 

  25. Faical A, Mersereau R (2001) Secure fragile digital watermarking technique for image authentication. In: Proceedings of the IEEE international conference on image processing, vol 3. Thessaloniki, pp 1031–1034

  26. Feng W, Liu Z-Q (2004) Bayesian structural content abstraction for image authentication. In: Proceedings of the third international conference on machine learning and cybernetics. Shanghai, 2004

  27. FIPS PUB XX (1993) Digital signature standard

  28. Fowler B, Arps R, ElGamal A (1995) Quadtree based JBIG compression. In: Proceedings of the IEEE data compression conference, pp 102–111

  29. Fridrich J (1998a) Image watermarking for tamper detection. In: Proceedings of the ICIP’98, Chicago, USA

  30. Fridrich J (1998b) Methods for tamper detecting in digital images. In: Proceedings of the 6th IEEE international workshop on intelligent signal processing and communication systems (ISPACS ’98), Melbourne, Australia

  31. Fridrich J (1999a) Methods for tamper detection in digital images. In: Proceedings of the multimedia and security workshop at ACM multimedia ’99, ACM, Orlando, FL, USA, pp 29–33

  32. Fridrich J (1999b) Robust bit extraction from images ICMCS’99, Florence, Italy

  33. Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication/watermark for images. In: Proceedings of the ICIP’2000, Vancouver, Canada

  34. Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: Proceedings of the SPIE, security and watermarking of multimedia contents, San Jose, California, January 23–26, 2001

  35. Fridrich J, Goljan M (1999a) Protection of digital images using self embedding. In: Proceedings of the symposium on content security and data hiding in digital media, Institute of Technology, New Jersey, USA

  36. Fridrich J, Goljan M (1999b) Images with self-correcting capabilities. In: Proceedings of the IEEE international conference on image processing, vol 3. Kobe, Japan, pp 792–796

  37. Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910

    Article  Google Scholar 

  38. Gao Q, Li R, Wang H (2004) Spread spectrum digital watermarking algorithm using gold codes. Journal of Xi’an Jiaotong University 38(2):119–123

    MATH  Google Scholar 

  39. Gennaro R, Jarecki S, Krawczyk H (1996) Robust threshold DSS signatures. Advances in cryptology—EUROCRYPT ’96. In: Proceedings on the international conference on the theory and application of cryptographic techniques. Lecture notes in computer science, vol 1070. Springer, pp 354–71

  40. Goljan M, Fridrich JJ, Du R (2002) Distortion-free data embedding for images. In: Proceedings of the 4th international workshop on information hiding, April 25–27, 2001, pp 27–41

  41. Gonzalez RC, Woods RE (2002) Digital image processing. Prentice-Hall, Upper Saddle River, NJ

    Google Scholar 

  42. Grossmann A, Morlet J (1987) Decomposition of function into wavelets of constant shape and related transforms. In: Streit L (ed) Mathematics and physics, lectures on recent results. World Scientific

  43. Hai Pang H, Sweeney P, Paffett J (1998) Extended Kasami algorithm for cyclic codes. In: Proceedings of the IEEE GLOBECOM 1998 (Cat. no. 98CH36250), vol 5. Sydney, Australia, pp 2834–2839

  44. Hampel H, Arps R, Chamzas C (1992) Technical features of the JBIG standard for progressive bi-level image compression. Signal Process Image Commun 4(2):103–111

    Article  Google Scholar 

  45. Harn L (1994) New digital signature scheme based on discrete logarithm. Electron Lett 30(5):396–398

    Article  Google Scholar 

  46. Harry A (1992) VDM specification of the MD4 message digest algorithm. Nat Phys Lab Teddington, UK, NPL DITC 204/92

  47. Helleseth T, Kumar V (1994) The weight hierarchy of the Kasami codes. In: Proceedings of the 1994 IEEE international symposium on information theory (Cat. no. 94CH3467-8), p 308

  48. Holliman M, Memon N (1997) Counterfeiting attacks on oblivious block-wise independant invisible watermarking schemes. IEEE Trans Image Process 6:432–441

    Google Scholar 

  49. Hu Y, Han D-Z (2005) Using two semi fragile watermark for image authentication. In: Proceedings of the international conference on machine learning and cybernetics, vol 9. Guangzhou, pp 5484–5489

  50. Inoue H, Miyazaki A, Katsura T (2000) A digital watermark for images using the wavelet transform. Integr Comput Aided Eng 7(2):105–115

    Google Scholar 

  51. Inoue T, Murakami T, Inomoto K (1997) Evaluation of image symmetry using 3rd order moments. Bulletin of Aichi Institute of Technology Part B 32:177–82

    Google Scholar 

  52. Johnson NF, Katezenbeisser SC (1999) A survey of steganographic techniques. In: Katzenbeisser SC et al. (eds) Information techniques for steganography and digital watermarking. Artec House, Northwood, MA, pp 43–75

    Google Scholar 

  53. Kailasanathan C, Safavi-Naini R, Ogunbona P (2001) Image authentication surviving acceptable modifications. IEEE-EURASIP, workshop on nonlinear signal and image processing

  54. Knudsen LR, Xuejia L (1998) Attacks on fast double block length hash functions. J Cryptol 11(1):59–72

    Article  MATH  Google Scholar 

  55. Kostopoulos I, Christodou-lakis D, Skodras AN (2001) Self-authentication of colour images. In: Proceedings of the European conference on electronic imaging and visual arts, Florence, Italy

  56. Kostopoulos I, Gilani SAM, Skodras AN (2002) Colour image authentication based on a self-embedding technique. In: Proceedings of the 14th international conference on digital signal processing (DSP2002) vol 2, Santorini, Greece, pp 733–736

  57. Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180

    Article  Google Scholar 

  58. Kutter M, Jordan F, Bossen F (1998) Digital watermaking of color images using amplitude modulation. J Electron Imaging 7(2):326–332

    Article  Google Scholar 

  59. Kutter M, Voloshynocskiy S, Herrigel, A (2000) The watermark copy attack. In: Proceedings of SPIE security and watermarking of multimedia content II, vol 3971, San Jose, California, USA

  60. Lambrecht C (1996) Perceptual models and architectures for video coding applications. Ph.D. thesis no 1520, Ecole Polytecnique Federale De Lausanne, Switzerland

  61. Lampson B, Rivest R (1997) Cryptography and information security group research project: a simple distributed security infrastructure. Technical report, MIT

  62. Langelaar G, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. IEEE Signal Process Mag 17:20–43

    Article  Google Scholar 

  63. Lee S, Jang D, Yoo CD (2005) An SVD-based watermarking method for image content authentication with improved security. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, vol 2, pp 525–528

  64. Leest A, Veen M, Bruekers F (2003) Reversible image watermarking. In: Proceedings of the ICIP’03, vol 2, September 2003, pp 731–734

  65. Li N, Wenliang D, Boneh D (2003) Oblivious signature-based envelope. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, vol 22, pp 182–189

  66. Liang S, Rangayyan RM (1997) Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6(2):198–207

    Article  Google Scholar 

  67. Liehua X, Gonzalo, R, Lewis AA (2000) Image enhancement towards soft image authentication. In: Proceedings of the IEEE international conference on multimedia and expo (I), pp 497–500

  68. Lin CY, Chang SF (1997) A robust image authentication method distinguishing JPEG compression from malicious manipulation. CU/CTR Technical Report 486-97-19

  69. Lin CY, Chang SF (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of the SPIE security and watermarking of multimedia content

  70. Lin CY, Chang SF (2001) SARI: self-authentication-and-recovery image watermarking system. ACM Multimedia, Ottawa, Canada

    Google Scholar 

  71. Lin ET, Christine I, Podilchuk B, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, San Jose, CA, USA

  72. Lin CY, Sow D, Chang SF (2001) Using self-authentication-and-recovery for error concealment in wireless environments. In: Proceedings of SPIE, vol 4518

  73. Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28:84–95

    Article  Google Scholar 

  74. Liu B, Wang X (2000) ECC performance evaluation for MDFE read channel. Chin J Electron 9(2):144–148

    Google Scholar 

  75. Liu H, Zhang Q, Wu J (2003) Trust issues in PGP and solutions. Journal of Beijing University of Aeronautics and Astronautics 29(3):278–282

    Google Scholar 

  76. Liu T, Hu X, Dai Y (2004) Semi fragile watermarking for image content authentication. In: Proceedings on the international conference on signal processing, vol 3, pp 2342–2345

  77. Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46:31–39

    Article  Google Scholar 

  78. Lu C-S (2000) Structural digital signature for image authentication: an incidental distortion resistant scheme. In: Proceedings of the ACM multimedia workshops, pp 115–118

  79. Lu H, Shen R, Chung F-L (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898–900

    Article  Google Scholar 

  80. Lu Z-M, Liu C-H, Xu D-G (2003) Semi-fragile image watermarking method based on index constrained vector quantization. Electron Lett 39(1):35–36

    Article  Google Scholar 

  81. Lu Z-M, Xu D-G, Sun S-H (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process. 14(6):822–831

    Article  Google Scholar 

  82. Manjunath BS, Shekhar C, Chellappa R (1996) A new approach to image feature detection with applications. Pattern Recogn 31:627–640

    Article  Google Scholar 

  83. Marvel LM, Boncelet CG (1999) Spread spectrum image steganography. IEEE Trans Image Process 8:1075–1083

    Article  Google Scholar 

  84. Marvel LM, Hartwig GW (2000) Compression compatible fragile and semi fragile tamper detection. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents, vol 2, p 3971

  85. Matsuo T, Kaoru K (2004) On parallel hash functions based on block-ciphers. In: Proceedings of the IEICE transactions on fundamentals of electronics, communications and computer sciences, pp 67–74

  86. Memon N, Fridrich, J (2000) Attack on a fragile watermarking scheme. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents, San Jose, California

  87. Memon ND, Fridrich J (2000) Further attacks on the Yeung–Mintzer fragile watermark. In: Proceedings of the SPIE international conference on security and watermarking of multimedia content II, vol 3971, San Jose, California, USA

  88. Memon N, Fridrich J, Goljan M (2000) Further attacks on Yeung–Mintzer watermarking scheme. In: Proceedings of the SPIE international conference on electronic imaging 2000, San Jose, USA

  89. Memon N, Poorvi V, Boon-Lock Y, Yeung M (2000) Distortion bounded authentication techniques. In: Proceedings of the SPIE international conference on security and watermarking of multimedia contents II, vol 3971, pp 164–174

  90. Meyer Y (1990) Ondelette, in ondelette et operateurs. Hermann

  91. Min-Shiang H, Jui-Lin L, Iuon-Chang L (2003) A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowl Data Eng 15(6):1552–1560

    Article  Google Scholar 

  92. Mintzer F, Braudaway G, Yeung M (1998) Effective and ineffective digital watermarks. In: Proceedings of the ICIP’97, Santa Barbara, CA, USA

  93. Mohand M, Mesbah A (1997) Apprendre et Maîtriser MATLAB, Springer

  94. Monga V, Vats D, Evans BL (2005) Image authentication under geometric attacks via structure matching. In: Proceedings of the IEEE international conference on multimedia and expo (ICME 2005), pp 229–232

  95. Naccache D, M’raïhi D, Vaudenay S, Raphaeli D (1995) Can DSA be improved? Complexity trade-offs with the digital signature standard. In: Proceedings of advances in cryptology—EUROCRYPT ’94. Workshop on the theory and application of cryptographic techniques, pp 77–85

  96. Niho Y (1972) Multi-valued cross-correlation functions between two maximal linear recursive sequence. Ph.D. dissertation, Department of Electrical Engineering, University of Southern California

  97. Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62–66

    MathSciNet  Google Scholar 

  98. Paquet AH, Ward RK (2002) Wavelet-based digital watermarking for image authentication. In: Proceedings of the IEEE Canadian conference on electrical and computer engineering, vol I. Winnipeg, Manitoba, Canada, pp 879–884

  99. Pennebarker WP, Mitchell JL (1993) JPEG: still image data compression standard. Van Nostrand Reinhold

  100. Petitcolas FAP, Anderson RJ, Kuhn MG (1993) Attacks on copyright marking systems. In Aucsmith, pp 218–238

  101. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding. A survey. In: Proceedings of the IEEE special issue on protection of multimedia content, vol 87, pp 1062–1078

  102. Pfitzmann B (1996) Digital signature schemes: general framework and fail-stop signatures. Lecture notes in computer science, vol 1100. Springer, Berlin, Allemagne

  103. Queluz MP (1998) Towards robust content based techniques for image authentication. In: Proceedings of IEEE signal processing society 1998 workshop on multimedia signal processing

  104. Queluz MP (1999) Content-based integrity protection of digital images. In: Proceedings of the SPIE conference on security and watermarking of multimedia contents, vol 3657. San Jose California, USA, pp 85–93

  105. Queluz MP, Salema C (1990) Compression factor and error sensitivity of the modified READ method. Communication, control and signal processing. In: Proceedings of the 1990 Bilkent international conference on new trends in communication, control and signal processing, vol 2, pp 1446–1452

  106. Radhakrishnan R, Memon N (2002) On the security of the SARI image authentication system. IEEE Trans Circuits Syst Video Technol 2:440–443

    Google Scholar 

  107. Rao K, Yip RP (1990) Discrete cosine transform: algorithms, advantages, applications. Academic, New York

    MATH  Google Scholar 

  108. Raveendran P, Ornatu S, Chew P (1997) New technique to derive invariant features for unequally scaled images. In: Proceedings of the IEEE international conference on systems, man and cybernetics, vol 4, pp 3158–3163

  109. Rivest R (1992) The MD4 message digest algorithm. RFC 1320, MIT and RSA Data Security, Inc

  110. Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MATH  MathSciNet  Google Scholar 

  111. Roe M (1994) Performance of symmetric ciphers and one-way hash functions. Fast software encryption. In: Proceedings of the Cambridge security workshop, pp 83–89

  112. Rogier N, Chauvaud P (1997) MD2 is not secure without the checksum byte. Designs Codes Cryptogr 12(3):245–251

    Article  MATH  MathSciNet  Google Scholar 

  113. Rosario G, Krawczyk H (2000) RSA-based undeniable signatures. J Cryptol 13(4):397–416

    Article  MATH  Google Scholar 

  114. Rothaus O (1993) Modified gold codes. IEEE Trans Inf Theory 39(2)654–656

    Article  MATH  MathSciNet  Google Scholar 

  115. Sanchez-Avila C, Sanchez-Reillol R (2001) The Rijndael block cipher (AES proposal): a comparison with DES. In: Proceedings of the IEEE 35th annual 2001 international Carnahan conference on security technology, pp 229–234

  116. Sarwate DV, Pursley MB (1980) Crosscorrelation properties of pseudorandom and related sequences. Proc IEEE 68:593–619

    Article  Google Scholar 

  117. Sayrol EJ, Cabanillas VS (1999) Optimum watermark detection for color images. In: Proceedings of the IEEE international conference on image processing, vol 2, pp 231–235

  118. Schneider M, Chang S-F (1996) A robust content based digital signature for image authentication. In: Proceedings of the IEEE international conference on image processing, pp 227–230

  119. Sergio D, Servetto KR, Orchard MT (1999) Image coding based on morphological representation of wavelet data. IEEE Trans Image Process 8(9):1161–1174

    Article  Google Scholar 

  120. Sherif, NE-D, Mansour M (2002) Fragile and semi-fragile image authentication based on image self-similarity image processing. In: Proceedings of the international conference on image processing, vol 2, pp 897-900

  121. Shin JB, Lee K, Shim K (2002) New DSA-verifiable signcryption schemes. In: Proceedings of the 5th international conference on information security and cryptology—ICISC 2002. Lecture notes in computer science, vol 2587. Springer, pp 35–47

  122. Skala V, Kucha M (2001) The hash function and the principle of duality. In: Proceedings of the computer graphics international, vol 200, pp 167–174

  123. Stallings W (1994) SHA: the secure hash algorithm. Dr. Dobb’s Journal of Software Tools 19(4):32–34

    Google Scholar 

  124. Storck D (1996) A new approach to integrity of digital images. In: Proceedings of the IFIP conference on mobile communication, pp 309–316

  125. Su C, Wang J (1993) ECCSyn. A synthesis tool for ECC circuits. In: Proceedings of the IEEE international symposium on circuits and systems, vol 3, pp 1706–1709

  126. Sun Q, Chang SF (2002) Semi-fragile image authentication using generic wavelet domain features and ECC. In: Proceedings of the ICIP

  127. Sun Q, Chang SF (2005) A secure and robust digital signature scheme for JPEG 2000 image authentication. IEEE Trans Multimedia 7(3):480–494

    Article  Google Scholar 

  128. Tanaka K, Nakamura Y, Matsui K (1990) Duplex modified-READ coding scheme for facsimile transmission of documents. Electron Commun Jpn Part 1 Commun 73(5):46–56

    Article  Google Scholar 

  129. Tancevski L, Bazgaloski L, Andonovic I (1994) Incoherent asynchronous optical CDMA using gold codes. Electron Lett 30(9):721–723

    Article  Google Scholar 

  130. Tang S, Li J-T, Zhang Y-D (2005) SSF fingerprint image authentication: an incidental distortion resistant scheme. In: Proceedings of ACM international conference on multimedia, November 2005

  131. Taubman D, Marcellin S, Michael W (2002) JPEG2000: image compression fundamentals, standards, and practice. Kluwer, Boston

    Google Scholar 

  132. The Mathworks Inc. image processing toolbox. User’s guide. Version 3

  133. Tian J (2002) Reversible watermarking by difference expansion. In: Proceedings of workshop on multimedia and security, December 2002, pp 19–22

  134. Tirkel AZ, Rankin GA, Schyndel van RG, Osborne CF (1993) Electronic watermark. DICTA-93. Macquarie University, Sydney, Australia, pp 666–672

  135. Trappe W, Washington LC (2002) Introduction to cryptography: with coding theory. Prentice-Hall, Upper Saddle River, NJ

    Google Scholar 

  136. Tsai WH (1985) Moment-preserving thresholding: a new approach. Comput Vis Graph Image Process 29:377–393

    Article  Google Scholar 

  137. Tsuyoshi T (2004) A fast RSA-type public-key primitive modulo pkq using Hensel lifting. IEICE Trans Fundam Electron Commun Comput Sci E87-A(1):94–101

    Google Scholar 

  138. Tzeng CH, Tsai WH (2001) A new technique for authentication of image/video for multimedia applications. In: Proceedings of ACM multimedia workshops—multimedia and security: new challenges, Ottawa, Ontario, Canada

  139. van Renesse RL (1998) Optical security and counterfeit deterrence techniques II, vol 3314, San Jose, California, USA

  140. van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of the IEEE international conference on image processing, vol 2, pp 86–90

  141. Venkatesan R, Koon S, Jakubowski M (2000) Robust image hashing. In: Proceedings of the IEEE international conference on image processing, vol 3, pp 664–666

  142. Walton S (1995) Information authentication for a slippery new age. Dr Dobb’s J 20(4):18–26

    MathSciNet  Google Scholar 

  143. Wang X, Liu B (2002) A new ECC/RLL coding scheme. Chin J Electron 11(2):186–191

    Google Scholar 

  144. Wigderson A (1994) Wonders of the digital envelope—a crash course in modern cryptography. In: Proceedings of the IFIP transactions A: computer science and technology, n A-51, technology and foundations, pp 235–238

  145. Wolfgang RB, Delp EJ (1997) Techniques for watermarking digital imagery: further studies. In: Proceedings of the international conference on imaging science, systems, and technology, vol 1. Las Vegas, Nevada, USA, pp 279–287

  146. Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: Proceedings of the IEEE international conference on image processing, vol 3, pp 219–222

  147. Wong PW (1998a) A watermark for image integrity and ownership verification. In: Proceedings of the IS&T PIC conference, Portland, OR, USA

  148. Wong PW (1998b) A public key watermark for image verification and authentication. In: Proceedings of the ICIP, Chicago, IL, USA

  149. Wong PW, Delp EJ (1999) Security and watermarking of multimedia contents, vol 3657. San Jose, California, USA, pp 204–213

  150. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601

    Article  MATH  Google Scholar 

  151. Wu CW (2001) Limitations and requirements of content based multimedia authentication systems. In: Proceedings of the IS&T/SPIE’s international symposium on electronic imaging: science and technology, San Jose, CA, vol 4314, pp 241–252

  152. Wu CW (2002) On the design of content based multimedia authentication systems. IEEE Trans Multimedia 4(3):385–393

    Article  Google Scholar 

  153. Xiaotie D, Chan L, Huafei Z (1999) A proposal for secure hash algorithm. In: Proceedings of the 1999 international workshop on cryptographic techniques and e-commerce, pp 254–258

  154. Xie L, Arce GR (1998a) A blind content based digital image signature. In: Proceedings of the second annual fedlab symposium on ATIRP

  155. Xie L, Arce GR, (1998b) A blind wavelet based digital signature for image authentication. In: Proceedings of the EUSIPCO-98

  156. Xie L, Arce GR (1998c) Joint wavelet compression and authentication watermarking. In: Proceedings of the ICIP’98

  157. Xie L, Lewis A (2000) Methods for soft image/video authentication. In: Proceedings of the 4th annual fedlab symposium on ATIRP

  158. Yeung MM (1998) Digital watermarking introduction. Commun ACM 41(7):31–33

    Article  Google Scholar 

  159. Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of the ICIP‘97, Santa Barbara, CA

  160. Yu S, Hu Y, Zhou J (2004) Content based watermarking scheme for image authentication. In: Proceedings of the control, automation, robotics and vision conference 2004, vol 2, pp 1083–1087

  161. Zheng Q, Chellappa R (1993) A computational vision approach to image registration. IEEE Trans Image Process 2(3):311–326

    Google Scholar 

  162. Zhu B, Tewfik AH, Gerek ON (1995) Low bit rate near-transparent image coding. SPIE Conf on Wavelet Application II 2491:173–184

    Google Scholar 

  163. Zhu B, Swanson MD, Tewfik AH (1996) Transparent robust authentication and distortion measurement technique for images. IEEE digital signal processing workshop (DSP 96)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rita Noumeir.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Haouzia, A., Noumeir, R. Methods for image authentication: a survey. Multimed Tools Appl 39, 1–46 (2008). https://doi.org/10.1007/s11042-007-0154-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-007-0154-3

Keywords

Navigation