Conference paper

Limitations and requirements of content-based multimedia authentication systems

Abstract

An overview is given on the advantages and disadvantages of image authetication schemes and their relationship with fundamental limitations of the underlying model of image authentication. A multimedia authentication scheme which combines some of the best features of both classes of algorithms is proposed. The scheme employs cryptographic hash functions and digital signature schemes and the data does not need to be modified to be made authenticatable.

Related