By Topic

The survey of digital watermarking-based image authentication techniques

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tong Liu ; Inst. of Inf. Sci., Northern Jiaotong Univ., Beijing, China ; Zheng-ding Qiu

In recent years, multimedia authentication techniques have been widely used in the integrity and content authentication of digital media. Current multimedia authentication schemes can be divided into 2 categories according to the authenticator: digital signature-based and digital watermarking-based. In this paper, a comprehensive overview of current tamper detection and authentication methods based on the digital watermarking is presented. We discuss authentication watermarking system and its desirable features, common methods of attack and their countermeasures, and survey some popular authentication watermarking schemes, finally give some suggestions for future researches.

Published in:

Signal Processing, 2002 6th International Conference on  (Volume:2 )

Date of Conference:

26-30 Aug. 2002