About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
SPIE Photonics West 2001
Conference paper
Limitations and requirements of content-based multimedia authentication systems
Abstract
An overview is given on the advantages and disadvantages of image authetication schemes and their relationship with fundamental limitations of the underlying model of image authentication. A multimedia authentication scheme which combines some of the best features of both classes of algorithms is proposed. The scheme employs cryptographic hash functions and digital signature schemes and the data does not need to be modified to be made authenticatable.