Abstract

Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.

Highlights

  • The digital revolution, the explosion of communication networks, and the increasingly growing passion of the general public for new information technologies lead to exponential growth of multimedia document traffic

  • Watermarking seems to be the alternative solution for reinforcing the security of multimedia documents

  • We decided to exclude from this paper any approach which does not include a watermarking aspect, in particular, approaches based on external signature, such as classical cryptographically secure hash functions like MD-4, MD-5, CRC-32 (32-bit cyclic redundancy check), SHA-1 [5], and so on

Read more

Summary

Introduction

The digital revolution, the explosion of communication networks, and the increasingly growing passion of the general public for new information technologies lead to exponential growth of multimedia document traffic (image, text, audio, video, etc.). This phenomenon is so important that insuring protection and control of the exchanged data has become a major issue. From their digital nature, multimedia documents can be duplicated, modified, transformed, and diffused very . We classify the watermarking methods into two categories (fragile watermarks and semifragile watermarks), even if the concept of robustness is sometimes ambiguous

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call