{"title":"A taxonomy for image authentication techniques and its application to the current state of the art","authors":"M. Albanesi, M. Ferretti, Federico Guerrini","doi":"10.1109/ICIAP.2001.957065","DOIUrl":null,"url":null,"abstract":"In this paper we propose a taxonomy for image authentication techniques that takes into account three different features: the level of integrity verification, the approach to the generation of the authenticator and the capability of localizing manipulated areas. The goal is to revise the current and very heterogeneous bibliography on this topic, and to define a set of basic requirements for an authentication service, in order to identify which ones have already been met and which ones remain challenging. The major algorithms proposed in the last decade are examined according to the classification criteria; advantages and drawbacks of the possible approaches are reported. In particular, we investigate the relationship between the well established digital signature techniques and the emerging watermarking approaches. As a result, we propose a methodological approach to the design of robust, secure and efficient authentication algorithms.","PeriodicalId":365627,"journal":{"name":"Proceedings 11th International Conference on Image Analysis and Processing","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 11th International Conference on Image Analysis and Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIAP.2001.957065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
In this paper we propose a taxonomy for image authentication techniques that takes into account three different features: the level of integrity verification, the approach to the generation of the authenticator and the capability of localizing manipulated areas. The goal is to revise the current and very heterogeneous bibliography on this topic, and to define a set of basic requirements for an authentication service, in order to identify which ones have already been met and which ones remain challenging. The major algorithms proposed in the last decade are examined according to the classification criteria; advantages and drawbacks of the possible approaches are reported. In particular, we investigate the relationship between the well established digital signature techniques and the emerging watermarking approaches. As a result, we propose a methodological approach to the design of robust, secure and efficient authentication algorithms.