Publication
SPIE Photonics West 2001
Conference paper
Limitations and requirements of content-based multimedia authentication systems
Abstract
An overview is given on the advantages and disadvantages of image authetication schemes and their relationship with fundamental limitations of the underlying model of image authentication. A multimedia authentication scheme which combines some of the best features of both classes of algorithms is proposed. The scheme employs cryptographic hash functions and digital signature schemes and the data does not need to be modified to be made authenticatable.