Various Authentication Techniques for Watermarking: A Survey
D.Y.Thorat1, Shiv K Sahu2, Amit Mishra3

1D.Y.Thorat, M.Tech. Scholar, Department of Information Technology, Technocrats Institute of Technology, Bhopal (Madhya Pradesh). India.
2Dr. Shiv K Sahu, Assoc. Prof. & Head, Department of Information Technology, Technocrats Institute of Technology, Bhopal (Madhya Pradesh). India.
3Amit Mishra, Asst. Prof., Department of Information Technology, Technocrats Institute of Technology, Bhopal (Madhya Pradesh). India.
Manuscript received on April 17, 2016. | Revised Manuscript received on April 24, 2016. | Manuscript published on April 25, 2016. | PP: 39-42 | Volume-4 Issue-4, April 2016. | Retrieval Number: D1095044416
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Due to large number of transmission of digital image over non-secure internet, image authentication techniques have recently gained great importance. Digital watermarking is utilized for copy write protection and ownership detection. However as techniques are get improved more focus is given to authentication. Because of authentication digital image become secure and protected to transfer the information over internet. To protect the authenticity of multimedia images different technique has been proposed. These approaches include conventional cryptography, fragile& semi fragile watermarking and digital signature that are based on image content. This paper presents the overview of techniques used for authentication. The different techniques are summarized and compare with each other by considering experimental results.
Keywords: Watermark Lifecycle, Robust Watermarking Schemes, HVS, ICA, Fragile watermarking schemes.