International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 101 | Views: 304

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016 | Popularity: 6.4 / 10


     

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari


Abstract: Image authentication methods based on conventional cryptography, fragile watermarking, semi-fragile watermarking and on image content signatures discussed in this paper. For each group of methods the type of the authentication tag, the dependency of this authentication tag on the image, the type of the authentication service provided are shown, that is strict or content-based (selective) image authentication service, the localization capacity of the altered regions, as well as the possibility of restoration of image corrupted regions. Algorithms are also grouped according to the authentication tag that is used, and references are included. It can be noticed that one principal property of an image authentication system, the detection of malevolent manipulations. According to the summary table, algorithms performances are very similar. In fact, most of algorithms offer acceptable detection and localization of image manipulations while restoration performances still need to be improved.


Keywords: cryptography, fragile watermarking, authentication tag, digital signature, hash function


Edition: Volume 5 Issue 12, December 2016


Pages: 1054 - 1061



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vrushali Chirmade, Dimple Chaudhari, "Review on Methods of Authentication of Images with Data Repair Capability", International Journal of Science and Research (IJSR), Volume 5 Issue 12, December 2016, pp. 1054-1061, https://www.ijsr.net/getabstract.php?paperid=ART20163585, DOI: https://www.doi.org/10.21275/ART20163585



Similar Articles

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 143 - 144

Blockchain Based Access Control System for Cloud Storage

Kamisetty Vinay

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1015 - 1019

A High Performance Data Encryption and Masking Using AES Algorithm

Poornima TN, Dr. Somashekar K

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1295 - 1299

Implementation of Elliptic Curve Cryptography Processor for FPGA Applications

Ch. Venkateswarlu, Nirmala Teegala

Share this Article

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 878 - 884

ASIC Architectures for Implementing ECC Arithmetic over Finite Fields

Hemanth Ravindra, Jalaja S

Share this Article



Top