Content-based image authentication: current status, issues, and challenges

被引:46
作者
Han, Shui-Hua [1 ]
Chu, Chao-Hsien [2 ]
机构
[1] Xiamen Univ, Sch Management, Xiamen 361005, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
Image hash; Content-based authentication; Performance trade-off; Security; Image tampering; ROBUST;
D O I
10.1007/s10207-009-0093-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With today's global digital environment, the Internet is readily accessible anytime from everywhere, so does the digital image manipulation software; thus, digital data is easy to be tampered without notice. Under this circumstance, integrity verification has become an important issue in the digital world. The aim of this paper is to present an in-depth review and analysis on the methods of detecting image tampering. We introduce the notion of content-based image authentication and the features required to design an effective authentication scheme. We review major algorithms and frequently used security mechanisms found in the open literature. We also analyze and discuss the performance trade-offs and related security issues among existing technologies.
引用
收藏
页码:19 / 32
页数:14
相关论文
共 28 条
[1]   Geometric invariance in image watermarking [J].
Alghoniemy, M ;
Tewfik, AH .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (02) :145-153
[2]  
[Anonymous], P IEEE INT C MULT EX
[3]  
Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274
[4]  
Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
[5]   Visual hash for oblivious watermarking [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :286-294
[6]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[7]  
HOLLIMAN M, 1999, P 2 WORKSH MULT NJI
[8]   Invariant image watermark-using Zernike moments [J].
Kim, HS ;
Lee, HK .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) :766-775
[9]   Robust perceptual image hashing via matrix invariants [J].
Kozat, SS ;
Venkatesan, R ;
Mihçak, MK .
ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, :3443-3446
[10]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168