Publication
SPIE Photonics West 2001
Conference paper

Limitations and requirements of content-based multimedia authentication systems

View publication

Abstract

An overview is given on the advantages and disadvantages of image authetication schemes and their relationship with fundamental limitations of the underlying model of image authentication. A multimedia authentication scheme which combines some of the best features of both classes of algorithms is proposed. The scheme employs cryptographic hash functions and digital signature schemes and the data does not need to be modified to be made authenticatable.

Date

Publication

SPIE Photonics West 2001

Authors

Topics

Share