Digital Image Authentication for Security and Validation Enhancement: Comparison
Please note this is a comparison between Version 1 by Sanwar Hosen and Version 2 by Camila Xu.

Digital face approaches possess currently received awesome attention because of their huge wide variety of digital audio, and visual programs. Digitized snapshots are progressively more communicated using an un-relaxed medium together with cyberspace. Consequently, defence, clinical, medical, and exceptional supervised photographs are essentially blanketed towards trying to employ it; such controls ought to damage such choices constructed totally based on those pictures.

  • watermarking
  • authentication
  • security
  • HMM
  • Viterbi algorithm

1. Introduction

In the past few years face identification and its verification received great attention in computer vision, pattern recognition and biometric communities. Common attraction among researchers motivated by the phenomenal capability to identify a human faces with evidence such that people’s occupations are related both in multimedia and daily routine. The facial analysis involves extracting or gathering information like age, gender, pose, landmark, naming etc. It includes different applications as well as law imposition, face biometrics for transactions, self-driving vehicles, active verification on devices etc. Validation and recognition of face systems basically consist of basic three steps. Starting, the stage consists of an identifier for confining profile in faces is required and belongings of profiles identifier are strong to variations in illuminations, scale and pose. Also, an efficient face identifier should be able to handle output constantly with a well confining limited area. The second stage localizes the facial indicators like the tip of the nose, view base, point of ear lobes, jaw corner etc. Such indicators are then worn to arrange profiles (faces) with ease consequence of scaling and in-level spinning. The last and third stage is of attribute separator which encrypts the naming statistics in a high-dimension locator. Such complete descriptions are worn to evaluate a similar point or outcome in the middle of similar profiles. A fruitful attribute separator capable to handle delusions found by back stages in the queue: profile alignment, face recognition and indicator finding [1].
The profile (face) has many benefits that force it to be one of the efficient bioscrypt distinguishing qualities. First, the profile face reflects internal emotions (affections) of happiness or sadness (concern) including the person’s approximate age and identity. Second, even at a long distance, the face biometric is easy to capture. And this feature makes face identification crucial in person recognition as well as in human-computer interaction. The profile face bioscrypt is impressed by a variety of extrinsic and natural variations like lighting, pose, age and expressions. In the past, an outstanding refinement was observed in the staging of the profile face identification, but quiet under the tolerable levels found in various applications. A modern attempt has mainly concentrated on different features, 3D (3-dimensional) prototypes and pictorial inputs to control the execution of additional demand in 2-dimensional profile still image identification [2][4]. Face geometrically is a 3D space sum of a large number of polygons that can be represented by facial features and pixels related to the face geometry. Image data computationally can be represented in vector form.

2. Digital Image Identification and Verification Using Maximum and Preliminary Score Approach with Watermarking for Security and Validation Enhancement

Walton in the year 1995 [3][5] proposed the first approach based on watermarking where image verification was done by fragile watermarking where only image facts are used to develop the watermark. This approach used the placing technique using checksum and least significant bit with a grey quantity of the most significant seven selected pseudo-randomly captured pixels. This approach localizes and detects but not having a repairing facility. In the year 2020 [4][6] proposed an algorithm that gain more attention where a large number of ‘N’ is used for evaluating the checksums and this size directly affects the detecting probability manipulations. H. Cheng in the year 2019 [5][7] proposed a method based on a secret key used to create a binary function and this function maps integers from interval {0, 1, 2,…..255} per colour image which is further used as code to calculate the grey level. M.T. Bhatti & W. Fang [6][7][8,9] in the year 20,211 proposed a method to prevent attack from vector quantification to prevent attack from vector quantification based on a private public key systems and minimize the quantification attack. Lee [8][10] in the year 2021 proposed a method to validate colour images using fragile watermarking where colour images are decomposed into three different parts for their protection also this colour component is used to hide the facts of images. Byun SC and K. Seth [9][10][11,12] in the year 2002 & 2021 proposed a technique that converts the grey level of original version of image in interval (−127, 128) and break image into 8 × 8 blocks and separate each blocks using cosine discrete transform. In [11][13] authors discussed digital watermarking approach to provide authentication and ownership for audio, videos and images where watermarking is first transformed and in way to encrypt the sequence of randomly generated pixels for key selection. In [12][14] authors discussed a watermarking approach in which dropped a mark in program and protecting its functionality and no one has right to uncover the mark without affecting the functionality. In [13][15] authors proposed a technology of watermarking for industries to provide security to their leased or hired data. In this paper Fractal and Spatial algorithm watermarking was considered to improve the protection of data compression. In Spatial approach there is no need for transforming the computation of embedding watermarking. Here nine co-ordinates minimum considered for its implementation. In [14][16] authors proposed a method for multimedia facts copyright protection using digital watermarking as it helps to reduce the increasing overhead. Text or numbers, videos, and images are considered for the analysis where information is not embedded in the frame throughout the data. Cryptography which is based on an unseeing image watermarking approach was presented to increase security. Scrambling watermarks with different attacks like Gaussian noise, median filtering, rotation etc. was also discussed in many papers. The existing approaches face the problems of protecting their functionality in protecting compressed data. It also arises the issue of copyright protection which increases the overhead. The decomposition of images increases the chances of validation and verification. The proposed model takes care of such issues in the training and testing phase process. This process increases the authentication and validation to become more secure without affecting the original version of images.
Video Production Service