Abstract

Technology has no limits today; we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.

Highlights

  • Many multimedia authentication systems have been proposed in the last few years for ensuring the integrity and origin of multimedia data such as images

  • To protect authenticity of images semifragile watermarking is very concerned by researchers because of its important function in multimedia content authentication

  • The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking

Read more

Summary

Introduction

Many multimedia authentication systems have been proposed in the last few years for ensuring the integrity and origin of multimedia data such as images. An image authentication scheme consists of a stamping stage and a verification stage. According to the processing of the generated authentication code, image authentication techniques can be divided into two categories: 1) label based systems, 2) watermarking-based approach. An authenticator is appended to the original signal for integrity verification of the protected signal. In watermark-based systems, the authenticator is imperceptibly embedded in the signal rather than appended to it, reducing the extra storage requirements of label based methods. Another advantage of watermark based systems is that lossless format conversion of the secured multimedia does not necessarily change its authenticity results

Objectives
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call