A taxonomy for image authentication techniques and its application to the current state of the art

M. Albanesi, M. Ferretti, Federico Guerrini
{"title":"A taxonomy for image authentication techniques and its application to the current state of the art","authors":"M. Albanesi, M. Ferretti, Federico Guerrini","doi":"10.1109/ICIAP.2001.957065","DOIUrl":null,"url":null,"abstract":"In this paper we propose a taxonomy for image authentication techniques that takes into account three different features: the level of integrity verification, the approach to the generation of the authenticator and the capability of localizing manipulated areas. The goal is to revise the current and very heterogeneous bibliography on this topic, and to define a set of basic requirements for an authentication service, in order to identify which ones have already been met and which ones remain challenging. The major algorithms proposed in the last decade are examined according to the classification criteria; advantages and drawbacks of the possible approaches are reported. In particular, we investigate the relationship between the well established digital signature techniques and the emerging watermarking approaches. As a result, we propose a methodological approach to the design of robust, secure and efficient authentication algorithms.","PeriodicalId":365627,"journal":{"name":"Proceedings 11th International Conference on Image Analysis and Processing","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 11th International Conference on Image Analysis and Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIAP.2001.957065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

In this paper we propose a taxonomy for image authentication techniques that takes into account three different features: the level of integrity verification, the approach to the generation of the authenticator and the capability of localizing manipulated areas. The goal is to revise the current and very heterogeneous bibliography on this topic, and to define a set of basic requirements for an authentication service, in order to identify which ones have already been met and which ones remain challenging. The major algorithms proposed in the last decade are examined according to the classification criteria; advantages and drawbacks of the possible approaches are reported. In particular, we investigate the relationship between the well established digital signature techniques and the emerging watermarking approaches. As a result, we propose a methodological approach to the design of robust, secure and efficient authentication algorithms.
图像认证技术的分类及其在当前技术中的应用
在本文中,我们提出了一个图像认证技术的分类,它考虑了三个不同的特征:完整性验证的水平,认证者的生成方法和定位被操纵区域的能力。我们的目标是修改当前关于该主题的各种各样的参考书目,并为身份验证服务定义一组基本需求,以便确定哪些已经满足,哪些仍然具有挑战性。根据分类标准对近十年提出的主要算法进行了研究;报告了各种可能方法的优缺点。特别是,我们研究了成熟的数字签名技术和新兴的水印方法之间的关系。因此,我们提出了一种设计稳健、安全和高效的认证算法的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信