ABSTRACT

This chapter presents the design steps for an authentication method based on the considerations. The general problem of data integrity authentication has traditionally been addressed by commercial picture authentication systems and image authentication cameras, which are based on common digital signature standards. Stream signatures aim to provide efficient source and data authentication for scalable data. The image authentication mechanism can take two forms. One is the self-contained autonomous content-based signature and the other is the authentication information targeted for embedding in specific code-streams. In modern coding standards, the creator can influence the coding of the image or video. Two important concepts related to the security of digital media are: source authentication and integrity authentication. Source and message integrity authentication and entity authentication are different concepts: entity authentication takes place during an online authentication protocol and its validity is confined to that transaction only.