Issues on Image Authentication
暂无分享,去创建一个
Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-andrecovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues. INTRODUCTION The well-known adage that “seeing is believing” is no longer true due to the pervasive and powerful multimedia manipulation tools. Such development has decreased the credibility that multimedia data such as photos, video or audio clips, printed documents, and so forth used to command. To ensure trustworthiness, multimedia authentication techniques are being developed to protect multimedia data by verifying the information integrity, the alleged source of data, and the reality of data. This distinguishes from other generic message authentication in its unique requirements of integrity. Message authentication techniques usually cannot allow any single bit of data change. However, multimedia This chapter appears in the book, Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Pro erty, edited by Chun-Shien Lu. Copyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms w hout written permission of Idea Group Inc. is prohibited. 701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com IDEA GROUP PUBLISHING
[1] Bhavani M. Thuraisingham,et al. Administering the Semantic Web: Confidentiality, Privacy, and Trust Management , 2007, Int. J. Inf. Secur. Priv..
[2] Dulal C. Kar,et al. Applied Cryptography for Security and Privacy in Wireless Sensor Networks , 2009, Int. J. Inf. Secur. Priv..
[3] Hamid R. Nemati,et al. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .
[4] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .