Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016
Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade, Dimple Chaudhari
Abstract: Image authentication methods based on conventional cryptography, fragile watermarking, semi-fragile watermarking and on image content signatures discussed in this paper. For each group of methods the type of the authentication tag, the dependency of this authentication tag on the image, the type of the authentication service provided are shown, that is strict or content-based (selective) image authentication service, the localization capacity of the altered regions, as well as the possibility of restoration of image corrupted regions. Algorithms are also grouped according to the authentication tag that is used, and references are included. It can be noticed that one principal property of an image authentication system, the detection of malevolent manipulations. According to the summary table, algorithms performances are very similar. In fact, most of algorithms offer acceptable detection and localization of image manipulations while restoration performances still need to be improved.
Keywords: cryptography, fragile watermarking, authentication tag, digital signature, hash function
Edition: Volume 5 Issue 12, December 2016,
Pages: 1054 - 1061
How to Cite this Article?
Vrushali Chirmade, Dimple Chaudhari, "Review on Methods of Authentication of Images with Data Repair Capability", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20163585, Volume 5 Issue 12, December 2016, 1054 - 1061
How to Share this Article?
Similar Articles with Keyword 'cryptography'
Image Cryptography Based Upon Scrambling and Random Integer
Gurpreet Singh, Lovleen Kaur
ASIC Architectures for Implementing ECC Arithmetic over Finite Fields
Hemanth Ravindra, Jalaja S
Similar Articles with Keyword 'digital signature'
New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS
Aruna P Adhav, K T Jadhao
Elliptical Curve Cryptography Based Hop-Hop Message Authentication
Similar Articles with Keyword 'hash function'
Skein and Threefish Implementation on FPGA
Litty.P.Oommen, Anas A S
FPGA Implementation of Cryptographic Hummingbird Algorithm with Improved Security: A Review
Nikita Samrit, Shubhada Thakare