The University of Sydney Page 3922.
–(b)–Message is not changed during the transmission does comes under data integrity.–Authentication does not address message integrity. –All other concepts or actions comes under proper authentication.