Review on Methods of Authentication of Images with Data Repair Capability
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 101 | Monthly Hits: ⮙1

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Image authentication methods based on conventional cryptography, fragile watermarking, semi-fragile watermarking and on image content signatures discussed in this paper. For each group of methods the type of the authentication tag, the dependency of this authentication tag on the image, the type of the authentication service provided are shown, that is strict or content-based (selective) image authentication service, the localization capacity of the altered regions, as well as the possibility of restoration of image corrupted regions. Algorithms are also grouped according to the authentication tag that is used, and references are included. It can be noticed that one principal property of an image authentication system, the detection of malevolent manipulations. According to the summary table, algorithms performances are very similar. In fact, most of algorithms offer acceptable detection and localization of image manipulations while restoration performances still need to be improved.

Keywords: cryptography, fragile watermarking, authentication tag, digital signature, hash function

Edition: Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Share this Article

How to Cite this Article?

Vrushali Chirmade, Dimple Chaudhari, "Review on Methods of Authentication of Images with Data Repair Capability", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20163585, Volume 5 Issue 12, December 2016, 1054 - 1061

Enter Your Email Address




Similar Articles with Keyword 'cryptography'

Downloads: 101 | Monthly Hits: ⮙1

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 878 - 884

ASIC Architectures for Implementing ECC Arithmetic over Finite Fields

Hemanth Ravindra, Jalaja S

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1367 - 1371

New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS

Aruna P Adhav, K T Jadhao

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

Similar Articles with Keyword 'fragile watermarking'

Downloads: 101 | Monthly Hits: ⮙1

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1419 - 1421

Enhancing the Protection of Digital Images against Tampering Using Joint Source Channel Coding

Sreeja M.S., Ann Nita Netto

Share this Article

Similar Articles with Keyword 'digital signature'

Downloads: 101 | Monthly Hits: ⮙1

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1367 - 1371

New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS

Aruna P Adhav, K T Jadhao

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this Article

Downloads: 117

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 864 - 867

Performance Analysis of Cryptographic Hash Functions

Smriti Gupta, Sandeep Kumar Yadav

Share this Article

Downloads: 125

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1703 - 1708

Efficient Handoff Based Privacy Preservation for VANET

Sibil Joseph, Rajagopal.R

Share this Article

Similar Articles with Keyword 'hash function'

Downloads: 101 | Monthly Hits: ⮙1

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

Downloads: 114

Review Papers, Electronics & Communication Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1566 - 1568

FPGA Implementation of Cryptographic Hummingbird Algorithm with Improved Security: A Review

Nikita Samrit, Shubhada Thakare

Share this Article

Downloads: 117

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 864 - 867

Performance Analysis of Cryptographic Hash Functions

Smriti Gupta, Sandeep Kumar Yadav

Share this Article

Downloads: 127

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 136 - 139

FPGA Implementation of MD5 Algorithm for Password Storage

Shadab Ahmad Khan

Share this Article



Top