Methods for image authentication: a survey

@article{Haouzia2007MethodsFI,
  title={Methods for image authentication: a survey},
  author={Adil Haouzia and Rita Noumeir},
  journal={Multimedia Tools and Applications},
  year={2007},
  volume={39},
  pages={1-46}
}
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed… CONTINUE READING
Highly Cited
This paper has 130 citations. REVIEW CITATIONS
79 Citations
155 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 79 extracted citations

131 Citations

01020'10'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 131 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 155 references

Un panorama des Méthodes de Tatouage Permettant d’Assurer un Service d’Intégrité

  • Dugelay J-L, C Rey
  • Revue Traitement du Signal
  • 2002
Highly Influential
3 Excerpts

Wavelet-based digital watermarking for image authentication

  • AH Paquet, RK Ward
  • Proceedings of the IEEE Canadian conference on…
  • 2002
Highly Influential
20 Excerpts

A proposal for secure hash algorithm

  • D Xiaotie, L Chan, Z Huafei
  • Proceedings of the 1999 international workshop on…
  • 1999
Highly Influential
5 Excerpts

A blind content based digital image signature

  • L Xie, GR Arce
  • Proceedings of the second annual fedlab symposium…
  • 1998
Highly Influential
20 Excerpts

Similar Papers

Loading similar papers…