Analyzing Different Digital Image Authentication Methods