Academia.eduAcademia.edu

Content Authentication

description31 papers
group19 followers
lightbulbAbout this topic
Content Authentication is the process of verifying the integrity and origin of digital content to ensure it has not been altered or tampered with. This field employs various techniques, including cryptographic methods and digital signatures, to establish trust in the authenticity of multimedia and textual information in digital environments.
lightbulbAbout this topic
Content Authentication is the process of verifying the integrity and origin of digital content to ensure it has not been altered or tampered with. This field employs various techniques, including cryptographic methods and digital signatures, to establish trust in the authenticity of multimedia and textual information in digital environments.

Key research themes

1. How can content authentication systems balance robustness against benign modifications while reliably detecting malicious manipulations in digital images and videos?

This research area focuses on developing authentication mechanisms that can distinguish intended, acceptable content modifications (such as compression, noise reduction) from unauthorized tampering that changes the actual content. It matters because digital multimedia undergoes various transformations during processing and transmission, and authentication systems need to be resilient to these benign changes while still ensuring integrity and authenticity of content.

Key finding: Introduced a continuous authenticity measure and a content-based digital signature framework that allows authentication despite allowable modifications like lossy compression, noise removal, or minor image processing, while... Read more
Key finding: Proposed an authentication scheme combining cryptographic digital signatures with invertible fragile watermarks that allow lossless watermark removal for untampered content, thus preserving original content precisely.... Read more
Key finding: Developed an intelligent video authentication algorithm leveraging support vector machines to detect both spatial and temporal tampering in raw videos. Presented an approach that uses machine learning classification to... Read more
Key finding: Combined a first-order alphanumeric Hidden Markov Model with zero-watermarking techniques to authenticate English text and detect tampering including insertion, deletion, and reordering. Demonstrated the approach’s robustness... Read more
Key finding: Highlighted the necessity of integrated media authentication networks that combine multiple content verification algorithms with user collaboration and training to combat widespread digital content tampering. Proposed... Read more

2. What architectural and cryptographic methods can secure content distribution in information-centric networking (ICN) architectures while preserving the benefits of ubiquitous caching?

Information-centric networking (ICN) shifts focus from host-based to content-based communications with widespread in-network caching. However, securing content against unauthorized access via encryption complicates caching benefits, since encrypted cached content is only accessible to authorized users with the decrypting keys. Research investigates schemes that enable secure content dissemination, consumer authentication, and original content verification in ICN without negating the benefits of caching.

Key finding: Proposed the Secure Distribution of Protected Content (SDPC) scheme, which uses lightweight symmetric key encryption and authentication to ensure only authorized consumers access cached content. Validated with BAN logic and... Read more
Key finding: Extended SDPC framework by addressing key distribution challenges among subscribers and ensuring consumer authentication without compromising cache effectiveness. Emphasized trade-offs between consumer-specific encryption and... Read more
Key finding: Introduced a novel certification methodology for Named Data Networking (NDN) nodes to continuously monitor and verify non-functional properties such as availability, integrity, and non-repudiation. Employed behavioral... Read more
Key finding: Addressed the content poisoning attack in ICN by proposing a cooperative content authentication framework that reduces redundant signature verification overhead in routers. Their system integrates distributed content... Read more
Key finding: Developed a content-centric network architecture incorporating elliptic curve cryptography-based public key infrastructure (ECC-PKI) for secure and efficient content dissemination. The scheme enhances secure content access,... Read more

3. How effective are web authentication and security policies like Content Security Policy (CSP) in real-world environments at preventing content-based attacks?

Content Security Policy (CSP) is a web-standard defense to mitigate risks from content injection attacks by limiting sources from which content and scripts can be loaded and executed. Investigations focus on adoption rates, browser compliance, correctness of configurations, and maintenance of CSP policies by websites. Understanding real-world deployment challenges informs improvements to defensive measures against web-based content exploits.

Key finding: Conducted large-scale measurement studies on CSP support across browsers and deployment across Alexa Top 1M websites. Found limited adoption and pervasive misconfigurations; 92.4% of surveyed websites had CSP policies... Read more
Key finding: Identified common classes of CSP misconfigurations including overly permissive directives and faulty syntax, reducing the protective capabilities of CSP. Demonstrated that many websites fail to leverage CSP’s reporting... Read more
Key finding: Proposed methods for server-side verification of web content integrity emphasizing that traditional secure communication channels like SSL/TLS do not prevent server-side or proxy-level content tampering. Emphasized the need... Read more

4. What emerging decentralized identity and authentication technologies improve the security, usability, and privacy of digital content and user verification?

Digital content authentication and user identity verification traditionally rely on centralized systems that pose privacy risks and single points of failure. Self-sovereign identity (SSI) and blockchain-based decentralized authentication mechanisms promise enhanced user control, interoperability, and resistance to forgery or data compromise. Research focuses on frameworks and practical implementations integrating these technologies for digital document and user authentication.

Key finding: Developed a document verification framework leveraging SSI principles and blockchain technology to create fraud-proof verifiable credentials and enable instant verifications. Demonstrated that SSI can simplify and secure... Read more
Key finding: Presented a decentralized authentication system using Ethereum blockchain and Web3 principles to eliminate dependence on third-party authentication providers. The implementation supports anonymous login with enhanced privacy... Read more
Key finding: Surveyed modern multi-factor and biometric authentication approaches, discussing their security properties, usability challenges, and future directions. Highlighted the trend towards decentralized and privacy-enhancing... Read more
Key finding: Reviewed classical authentication techniques from knowledge, possession, and biometrics categories. Discussed the importance of multi-factor authentication, encryption, and policy considerations in safeguarding user... Read more
Key finding: Proposed a context-aware authorization framework to protect individual privacy and secure identity information by dynamically applying policies based on user roles, environment, and purpose. The approach supports nuanced... Read more

All papers in Content Authentication

As generative AI technologies become more prevalent across creative and industrial sectors, their impact on content creation and ethical implications have gained unprecedented significance. This paper examines the transformative landscape... more
The rapid proliferation of online news channels has significantly transformed how individuals access and consume news. This study evaluates the preferences of online news channels and the perceived content credibility among staff of... more
Data hiding is method where secret data is embedded into an original image in a reversible manner. Usually RDH spatial-domain photographs are encrypted. The reversible data hiding can thought as a data carrier that hide secret information... more
Digital watermarking is the newfangled idea in digital media. As the replication and modification of digital media content is done frequently and without any significant obstruction, secrecy and authenticity become vulnerable to attacks.... more
In recent times, the transmission and storage of digital documents/information over the unsecured channel ar huge issues and nearly all of the digital documents ar compressed before they're hold on or transmitted to avoid wasting the... more
Recently, the use of data hiding in hiding annotations, confidential data, or side information into multimedia attracts the attention of researchers in various fields, especially in digital library. One of the essential tasks in digital... more
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distortion, this highlights the needs of lossless watermarking.... more
This is a book about Windows application development in C++. It addresses some rather difficult problems that occur during the development of advanced applications. Most books in this genre have many short code examples. This one has only... more
This study explores the interaction between users and content on the ‘Daily Trust Hausa’ and ‘Vanguard Hausa’ cloned pages of the authentic ‘Daily Trust’ and ‘Vanguard’ newspapers on Facebook, with a focus on the prevalence of fake news... more
In this paper, a novel watermarking technique for the tamper detection of text images is pro- posed. Entropy of every sentence is computed and Markov matrix using the occurrences of the characters is used to generate a character pattern.... more
In a world connected through a myriad of communication media, such as mobile phones and the Internet, it is extremely important that confidential information traveling across public networks reaches its destination with privacy preserved.... more
Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned sine transform (PST) is... more
Reversible data hiding (RDH) techniques for JPEG images have big challenges in order to improve the capacity, quality, and flexible embedding method. In this paper, we propose a new RDH algorithm using combination of selected DCT... more
Research focuses on the perceptions of engineers towards highway projects contract types' (CTs) performance and their respective selection criteria (SC). A questionnaire survey evaluated the CTs against the selected criteria. The SPSS... more
In the study of content authentication and tamper detection of digital text documents, there are very limited techniques available for content authentication of text documents using digital watermarking techniques. A novel intelligent... more
In order to authenticate the authenticity and integrity of watermark, a fragile watermarking algorithm is proposed for the content authentication of digital media products. First, the watermark is embedded into the least significant bit... more
Recent advancement in data transfer and networking techniques has put forward a considerable threat for secure data transfer. It is the sensitive information that flows via network fuels the engine of global economy. One of the main... more
Watermarking has been used time and again for authentication & security of images. Many watermarking Techniques have evolved over a period of last 20 years in the field of information Security. Watermarking embeds identifying information... more
In this article, due to the importance of embedding encrypted information in the image, a watermarking method is proposed based on local statistics in pixels. The advantages of the proposed method include its complete reversibility and... more
Content authentication has become an important issue for surveillance video. This paper presents a watermarking system based on Discrete Cosine Transform (DCT) for Motion-JPEG video authentication. To protect the integrity of the video... more
Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text... more
In this paper, a combined approach CAZWNLP (a combined approach of zero-watermarking and natural language processing) has been developed for the tampering detection of English text exchanged through the Internet. The third gram of... more
Text information is a natural language dependent. Therefore, improving security and reliability of text information exchanged via Internet network has become one of the most challenges faced by researchers. Content authentication,... more
Recently, the use of data hiding in hiding annotations, confidential data, or side information into multimedia attracts the attention of researchers in various fields, especially in digital library. One of the essential tasks in digital... more
The present chapter investigates content authentication strategies and their use in media practice. Remarkable research progress has been conducted on media veracity methods and algorithms, however, without providing that much... more
The zero text watermarking is a practical method for protecting the copyright from being tampered and copied. This paper aim to obtain zero watermarking technique with Hybrid Structural component and word length (HSW) where contains two... more
This paper presents secret data concealment and compressing encrypted images based on auxiliary information generation for efficient secure transmission under insufficient bandwidth. The process starts by encryption of uncompressed... more
This paper introduced a reversible data hiding method based on pixel value ordering with the prediction-error expansion technique and the average value of end pixels'. A host image is first segmented into non-overlapping sub-blocks of... more
The need for an efficient technique for compression of Images is ever increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission and storage. In this paper, an efficient algorithm... more
Since the internet is a public network, it presents some privacy and security issues and therefore in the development of e-learning [7,9,12] systems, security plays an important role. Generally, online transaction or online learning can... more
The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia enables protection mechanism in decrypted contents. The aims of this... more
Data loss during big data transmission is an important issue. Data loss occurs due to various transmission errors, channel noises and huge data size, which increases channel congestion and transmission delay. However, these issues can be... more
For some critical applications such as the law enforcement, medical and military image system, it is crucial to restore the original image without any distortions. The watermarking techniques satisfying those requirements are referred to... more
In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.... more
In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model... more
Data loss during big data transmission is an important issue. Data loss occurs due to various transmission errors, channel noises and huge data size, which increases channel congestion and transmission delay. However, these issues can be... more
Digital watermarks have recently been proposed for authentication of both video data and still images and for integrity verification of visual multimedia. In such applications, the watermark has to depend on a secret key and on the... more
In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.... more
Watermarking is extensively used in various media for data transfer, content authentication and integrity. The continuous flow of data is always vulnerable to tamper. This research proposes a new watermarking scheme that detects tampering... more
The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the... more
a b s t r a c t Perceptual hashing is conventionally used for content identification and authentication. It has applications in database content search, watermarking and image retrieval. Most countermeasures proposed in the literature... more
Recent advancement in data transfer and networking techniques has put forward a considerable threat for secure data transfer. It is the sensitive information that flows via network fuels the engine of global economy. One of the main... more
Technology continues to change the way we live, work, and play. Technology has a striking impact on learners and learning. Learning technologies can adapt to the needs, requirements and preferences of each individual user, therefore they... more
Nowadays there is a need to protect our health related information for authentication and privacy purpose. In the proposed work multiple QR codes are watermarked inside a single color medical image using Variable Bit Replacement (VBR)... more
The perceptual video hash function defines a feature vector that characterizes a video depending on its perceptual contents. This function must be robust to the content preserving manipulations and sensitive to the content changing... more
In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to... more
The perceptual video hash function defines a feature vector that characterizes a video depending on its perceptual contents. This function must be robust to the content preserving manipulations and sensitive to the content changing... more
Watermarking is the most imperative innovation for installing (Adding) concealed picture<br> into the information picture with the assistance of different calculations. Due to this feature<br> of watermarking now days it is... more
This paper presents secret data concealment and compressing encrypted images based on auxiliary information generation for efficient secure transmission under insufficient bandwidth. The process starts by encryption of uncompressed... more
Download research papers for free!