“…20 • Independently authenticated algorithms receive validation based on an image-independent authentication sequence, as in the methods of Eggers,7,21 Fridrich, 16 Lin, Podilchuk, and Delp, 9 Queluz and Lamy, 22,23 Kundur and Hatzinakos, 24,25 Lan, Mansour, and Tewfik, 26 and Gwo, Lu, and Liao. 27 We plan to present a comparative assessment of the statistically authenticated, oblivious, semifragile watermarking techniques.…”