IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Digital Image Authentication: A Review

Digital Image Authentication: A Review
View Sample PDF
Author(s): Yue Li (Nankai University, Tianjin, China)and Chia-Hung Wei (Ching Yun University, Taiwan)
Copyright: 2011
Volume: 2
Issue: 2
Pages: 24
Source title: International Journal of Digital Library Systems (IJDLS)
DOI: 10.4018/jdls.2011040104

Purchase

View Digital Image Authentication: A Review on the publisher's website for pricing and purchasing information.

Abstract

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only provides some practical applications on image authentication, but also describes general frameworks of image watermarking and the general techniques, including robust watermarking, fragile watermarking, and semi-fragile watermarking. This paper also addresses the potential issues on future research directions, including managing the PRNU database, development of advanced PRNU-based blind authentication techniques, and search for digital fingerprints.

Related Content

Karen Medin. © 2015. 8 pages.
Gail Dickinson, James A. Marken. © 2015. 7 pages.
Mary Axford, Crystal Renfro. © 2015. 15 pages.
Maria Kingsbury. © 2015. 14 pages.
Peace Ossom Williamson. © 2015. 20 pages.
Nadim Akhtar Khan, Tazeem Zainab. © 2015. 17 pages.
Adekunle P. Adesola, Grace Olla, Roseline Mitana Oshiname, Adeyinka Tella. © 2015. 17 pages.
Body Bottom