Amotz Bar-Noy, Sudipto Guha, et al.
ACM Transactions on Algorithms
An overview is given on the advantages and disadvantages of image authetication schemes and their relationship with fundamental limitations of the underlying model of image authentication. A multimedia authentication scheme which combines some of the best features of both classes of algorithms is proposed. The scheme employs cryptographic hash functions and digital signature schemes and the data does not need to be modified to be made authenticatable.
Amotz Bar-Noy, Sudipto Guha, et al.
ACM Transactions on Algorithms
Alan E. Rosenbluth, Gregg Gallatin, et al.
SPIE Optics + Photonics 2005
Jacob E. Fromm
Journal of Computational Physics
A. Mojsilovic, Bernice E. Rogowitz
SPIE Photonics West 2001