Authentication techniques for multimedia content

The recent proliferation of digital multimedia content has raised the issue of authentication techniques for multimedia content that is composed of still images, video and audio. Subsequently, there have been many authentication techniques for multimedia objects that have been recently proposed. One such class of techniques is based on digital watermarks and in this paper, we focus on such techniques. There are basically two types of watermarks that have been proposed for purposes of authentication, Fragile Watermarks and Content-based Authentication Watermarks. In this paper we survey different types of fragile and content-based authentication watermarking techniques that have been proposed in the literature. We point to new issues raised by the problem of authentication of multimedia content. We also discuss some shortcomings of proposed techniques and list open problems that still do not admit a satisfactory solution.

[1]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[2]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[3]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[5]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[6]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[7]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[10]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[11]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[12]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[13]  David J. Fleet,et al.  Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.

[14]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.