Abstract

At present, the multimedia data will be transmitted rapidly using an internet. But, whether the data reaches the recipient without tampering is questionable. The current multimedia editing software allows adversaries to alter multimedia data without changing its visual perception. Different categories of approaches exist for verifying the integrity as well as authenticity of multimedia data. The Content Based Authentication (CBA) is one among them. This review paper describes various Content Based Image Authentication (CBIA) methods, which have been developed for integrity verification of images. And also, this paper summarizes various techniques used in existing image authentication methods to extract robust features. In addition, this paper discusses the important characteristics of a CBIA approach, limitations of existing methods and future research directions. The development of robust and secure image authentication method for content authentication is still an open challenge for current researchers.

Keywords
Keywords: Content Based Image Authentication, Image Hashing, Integrity Verification, Robustness, Fragility.

Purchase Instant Access

PDF
10
USD

250
INR

HTML
10
USD

250
INR

Username / Email
Password
Don't have an account?  Sign Up
  • If you would like institutional access to this content, please recommend the title to your librarian.
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.

We strive to bring you the best. Your feedback is of great value to us. Feel free to post your comments and suggestions.