Reference Hub1
Challenges and Solutions in Multimedia Document Authentication

Challenges and Solutions in Multimedia Document Authentication

Stefan Katzenbeisser, Huajian Liu, Martin Steinebach
ISBN13: 9781605668369|ISBN10: 1605668362|EISBN13: 9781605668376
DOI: 10.4018/978-1-60566-836-9.ch007
Cite Chapter Cite Chapter

MLA

Katzenbeisser, Stefan, et al. "Challenges and Solutions in Multimedia Document Authentication." Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, IGI Global, 2010, pp. 155-175. https://doi.org/10.4018/978-1-60566-836-9.ch007

APA

Katzenbeisser, S., Liu, H., & Steinebach, M. (2010). Challenges and Solutions in Multimedia Document Authentication. In C. Li (Ed.), Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions (pp. 155-175). IGI Global. https://doi.org/10.4018/978-1-60566-836-9.ch007

Chicago

Katzenbeisser, Stefan, Huajian Liu, and Martin Steinebach. "Challenges and Solutions in Multimedia Document Authentication." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, 155-175. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-836-9.ch007

Export Reference

Mendeley
Favorite

Abstract

Multimedia document authentication allows the judging of the authenticity and integrity of digital documents. Today a variety of such tools exist which are constructed using different approaches, namely forensic methods, perceptual hashes and digital watermarks. Digital document forensics identifies the source of a document as well as its integrity by means of passive estimation. Perceptual hashing allows computing of short digests of documents; the hashes are insensitive against some signal processing operations and may serve as proof of integrity. Finally, authentication watermarking even allows gaining precise and reliable knowledge on the nature of modifications that a digital document underwent. In this chapter, we give an overview of the three complementary technologies, survey state-of-the-art methods and provide an analysis of their strength and weaknesses.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.