The survey of digital watermarking-based image authentication techniques

被引:0
|
作者
Liu, T [1 ]
Qiu, ZD [1 ]
机构
[1] No Jiaotong Univ, Inst Sci Informat, Beijing 100044, Peoples R China
关键词
authentication; digital watermarking; information security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, multimedia authentication techniques have been widely used in the integrity and content authentication of digital media. Current multimedia authentication schemes can be divided into 2 categories according to the authenticator: digital signature-based and digital watermarking-based., In this paper, a comprehensive overview of current tamper detection and, authentication methods based on the digital watermarking is. presented. We discuss, authentication watermarking system and its desirable-feature's, common methods of attack and their countermeasures, and survey some popular authentication watermarking schemes, finally give some suggestions for future researches.
引用
收藏
页码:1556 / 1559
页数:4
相关论文
共 50 条
  • [1] A Survey of Watermarking-Based Authentication for Digital Image
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chen, Zhao-Ru
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 207 - 211
  • [2] Watermarking-based digital audio data authentication
    Steinebach, M
    Dittmann, J
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2003, 2003 (10) : 1001 - 1015
  • [3] A digital watermarking-based image authentication mechanic for distributed embedded systems
    Yuan, S
    Huss, SA
    [J]. International Conference on Computing, Communications and Control Technologies, Vol 3, Proceedings, 2004, : 207 - 212
  • [4] Watermarking-Based Digital Audio Data Authentication
    Martin Steinebach
    Jana Dittmann
    [J]. EURASIP Journal on Advances in Signal Processing, 2003
  • [5] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [6] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    [J]. ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [7] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [8] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [9] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057
  • [10] A survey of digital image watermarking techniques
    Potdar, VA
    Han, S
    Chang, E
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 709 - 716