A Survey of Watermarking Algorithms for Image Authentication
<p/> <p>Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular techniq...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2002-01-01
|
Series: | EURASIP Journal on Advances in Signal Processing |
Subjects: | |
Online Access: | http://dx.doi.org/10.1155/S1110865702204047 |
id |
doaj-50488b5f3cb74e579e808bdbfeeab962 |
---|---|
record_format |
Article |
spelling |
doaj-50488b5f3cb74e579e808bdbfeeab9622020-11-24T20:53:22ZengSpringerOpenEURASIP Journal on Advances in Signal Processing1687-61721687-61802002-01-0120026218932A Survey of Watermarking Algorithms for Image AuthenticationRey ChristianDugelay Jean-Luc<p/> <p>Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.</p>http://dx.doi.org/10.1155/S1110865702204047image processingsecuritycryptographywatermarkingcontent authenticationreviewstate of the art |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Rey Christian Dugelay Jean-Luc |
spellingShingle |
Rey Christian Dugelay Jean-Luc A Survey of Watermarking Algorithms for Image Authentication EURASIP Journal on Advances in Signal Processing image processing security cryptography watermarking content authentication review state of the art |
author_facet |
Rey Christian Dugelay Jean-Luc |
author_sort |
Rey Christian |
title |
A Survey of Watermarking Algorithms for Image Authentication |
title_short |
A Survey of Watermarking Algorithms for Image Authentication |
title_full |
A Survey of Watermarking Algorithms for Image Authentication |
title_fullStr |
A Survey of Watermarking Algorithms for Image Authentication |
title_full_unstemmed |
A Survey of Watermarking Algorithms for Image Authentication |
title_sort |
survey of watermarking algorithms for image authentication |
publisher |
SpringerOpen |
series |
EURASIP Journal on Advances in Signal Processing |
issn |
1687-6172 1687-6180 |
publishDate |
2002-01-01 |
description |
<p/> <p>Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.</p> |
topic |
image processing security cryptography watermarking content authentication review state of the art |
url |
http://dx.doi.org/10.1155/S1110865702204047 |
work_keys_str_mv |
AT reychristian asurveyofwatermarkingalgorithmsforimageauthentication AT dugelayjeanluc asurveyofwatermarkingalgorithmsforimageauthentication AT reychristian surveyofwatermarkingalgorithmsforimageauthentication AT dugelayjeanluc surveyofwatermarkingalgorithmsforimageauthentication |
_version_ |
1716797239499685888 |