Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

1. Hash-Based Authentication of Digital Images in Noisy Channels

verfasst von : Fawad Ahmed, Amir Anees

Erschienen in: Robust Image Authentication in the Presence of Noise

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The advancement in digital technology has provided us with a number of software tools that can be used to tamper digital media contents, for example, images. This creates several challenges in case if a digital image is to be used as a legal evidence. Can we use traditional cryto-hashing and digital signatures to meet the integrity and authentication requirements of digital images? Considering an image as a data stream, cryptographic hash functions like Secure Hash Algorithm 1 (SHA1) along with the Rivest Shamir Adleman (RSA) algorithm can be used for integrity verification and authentication. One of the earliest work to adapt this approach was done by Friedman. There are, however, several reasons that actually impede the direct use of cryptographic techniques for solving multimedia security problems. Unlike textual data that is transmitted through a lossless medium, multimedia data like audio, image and video may be transmitted and stored using a lossy medium to save bandwidth and storage space. Therefore, using traditional cryptographic hash functions for integrity verification and authentication of multimedia content has a problem that a single bit change in the content due to lossy medium will significantly change the hash value.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li W, Yuan Y, Yu N. Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process; in press. Li W, Yuan Y, Yu N. Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process; in press.
2.
Zurück zum Zitat Vanstone SA, Menezes AJ, Oorschot PC. Handbook of applied cryptography. Boca Raton: CRC Press; 1996. Vanstone SA, Menezes AJ, Oorschot PC. Handbook of applied cryptography. Boca Raton: CRC Press; 1996.
3.
Zurück zum Zitat Friedman GL. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron. 1993;39(4):905–10.CrossRef Friedman GL. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron. 1993;39(4):905–10.CrossRef
4.
Zurück zum Zitat Zeng W, Yu H, Lin C-Y. Multimedia security technologies for digital rights managements. Burlington: Elsevier Inc.; 2006. Zeng W, Yu H, Lin C-Y. Multimedia security technologies for digital rights managements. Burlington: Elsevier Inc.; 2006.
5.
Zurück zum Zitat Furht B, Kirovski D. Multimedia security handbook. Boca Raton: CRC Press; 2005. Furht B, Kirovski D. Multimedia security handbook. Boca Raton: CRC Press; 2005.
6.
Zurück zum Zitat Lian S. Multimedia content encryption: techniques and applications. Boca Raton: CRC Press; 2008. Lian S. Multimedia content encryption: techniques and applications. Boca Raton: CRC Press; 2008.
7.
Zurück zum Zitat Ahmed F, Siyal MY, Abbas V-U. A secure and robust hash-based scheme for image authentication. Signal Process. 2010;90(5):1456–70.CrossRefMATH Ahmed F, Siyal MY, Abbas V-U. A secure and robust hash-based scheme for image authentication. Signal Process. 2010;90(5):1456–70.CrossRefMATH
8.
Zurück zum Zitat Cox IJ, Miller ML, Bloom JA. Digital watermarking. San Francisco: Morgan Kaufmann Publishers, Inc.; 2001. Cox IJ, Miller ML, Bloom JA. Digital watermarking. San Francisco: Morgan Kaufmann Publishers, Inc.; 2001.
9.
Zurück zum Zitat Schneier B. Applied cryptography. USA: Wiley; 1996. Schneier B. Applied cryptography. USA: Wiley; 1996.
10.
Zurück zum Zitat Wong PW, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process. 2001;10(10):1593–601.CrossRefMATH Wong PW, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process. 2001;10(10):1593–601.CrossRefMATH
11.
Zurück zum Zitat Monga V, Evans BL. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process. 2006;15(11):3452–65. Monga V, Evans BL. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process. 2006;15(11):3452–65.
12.
Zurück zum Zitat Radhakrishnan R, Memon N. On the security of the digest function in the SARI image authentication system. IEEE Trans Circuits Syst Video Technol. 2002;12(11):1030–3.CrossRef Radhakrishnan R, Memon N. On the security of the digest function in the SARI image authentication system. IEEE Trans Circuits Syst Video Technol. 2002;12(11):1030–3.CrossRef
13.
Zurück zum Zitat Radhakrishnan R, Xiong Z, Memon N. On the security of the visual hash function. Security and Watermarking of Multimedia Contents V. In: Delp EJ III., Wong PW, editors. SPIE vol. 5020, pp. 644–52; 2003. Radhakrishnan R, Xiong Z, Memon N. On the security of the visual hash function. Security and Watermarking of Multimedia Contents V. In: Delp EJ III., Wong PW, editors. SPIE vol. 5020, pp. 644–52; 2003.
14.
Zurück zum Zitat Sun Q, Chang S-F. A robust and secure media signature scheme for JPEG images. J VLSI Signal Process. 2005;41:305–17.CrossRef Sun Q, Chang S-F. A robust and secure media signature scheme for JPEG images. J VLSI Signal Process. 2005;41:305–17.CrossRef
15.
Zurück zum Zitat Xie L, Arce GR, Graverman RF. Approximate message authentication codes. IEEE Trans Multimed. 2001;3(2):242–52.CrossRef Xie L, Arce GR, Graverman RF. Approximate message authentication codes. IEEE Trans Multimed. 2001;3(2):242–52.CrossRef
16.
Zurück zum Zitat Gravemen RF, Fu K. Approximate message authentication codes. Proc. 3rd Annual Fedlab Symp. Advanced Telecommunications Information Distribution, vol. 1, College Park, MD; 1999. Gravemen RF, Fu K. Approximate message authentication codes. Proc. 3rd Annual Fedlab Symp. Advanced Telecommunications Information Distribution, vol. 1, College Park, MD; 1999.
17.
Zurück zum Zitat Lou D-C, Liu J-L. Fault resilient and compression tolerant signature for image authentication. IEEE Trans Consumer Electron. 2000;46(1):31–9.CrossRef Lou D-C, Liu J-L. Fault resilient and compression tolerant signature for image authentication. IEEE Trans Consumer Electron. 2000;46(1):31–9.CrossRef
18.
Zurück zum Zitat Lei Y, Wang Y, Huang J. Robust image hash in Radon transform domain for authentication. Signal Process: Image Commun. 2011;26:280–8. Lei Y, Wang Y, Huang J. Robust image hash in Radon transform domain for authentication. Signal Process: Image Commun. 2011;26:280–8.
19.
Zurück zum Zitat Tang Z, Dai Y, Zhang X. Perceptual hashing for color images using invariant moments. Appl Math Inf Sci. 2012;6(2S):643S–50S. Tang Z, Dai Y, Zhang X. Perceptual hashing for color images using invariant moments. Appl Math Inf Sci. 2012;6(2S):643S–50S.
20.
Zurück zum Zitat Schneider M, Chang SF. A content based digital signature for image authentication. Int. Conf. Image Processing, Lausanne, Switzerland; 1996, pp. 227–30. Schneider M, Chang SF. A content based digital signature for image authentication. Int. Conf. Image Processing, Lausanne, Switzerland; 1996, pp. 227–30.
21.
Zurück zum Zitat Lin CY, Chang S-F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol. 2001;11(2):153–68.CrossRefMathSciNet Lin CY, Chang S-F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol. 2001;11(2):153–68.CrossRefMathSciNet
22.
Zurück zum Zitat Uehara T, Safavi-Naini R. On (in) security of a robust image authentication method. In: Y-C Chen et al., editors. LNCS 2532, pp. 1025–32; 2002. Uehara T, Safavi-Naini R. On (in) security of a robust image authentication method. In: Y-C Chen et al., editors. LNCS 2532, pp. 1025–32; 2002.
23.
Zurück zum Zitat Zhao Y, Gu C, Wei W. Image hashing based on color histogram. J Inf Comput Sci. 2012;9(15):4397–404. Zhao Y, Gu C, Wei W. Image hashing based on color histogram. J Inf Comput Sci. 2012;9(15):4397–404.
24.
Zurück zum Zitat Lu CS, Liao H-YM. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed. 2003;5(2):161–73.CrossRefMathSciNet Lu CS, Liao H-YM. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed. 2003;5(2):161–73.CrossRefMathSciNet
25.
Zurück zum Zitat Swaminathan A, Mao Y, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing; 2004, pp. 355–8. Swaminathan A, Mao Y, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing; 2004, pp. 355–8.
26.
Zurück zum Zitat Monga V, Mihcak MK. Robust image hashing via non-negative matrix factorizations. IEEE Int. Conf. on Acoustic Speech and Signal Processing; 2006, pp. 225–8. Monga V, Mihcak MK. Robust image hashing via non-negative matrix factorizations. IEEE Int. Conf. on Acoustic Speech and Signal Processing; 2006, pp. 225–8.
27.
Zurück zum Zitat Lv X, Wang ZJ. Fast Johnson-Lindenstrauss transform for Robust and secure image hashing. 10th IEEE Workshop on Multimedia and Signal Processing, Cairns, Australia; 2008, pp. 725–9. Lv X, Wang ZJ. Fast Johnson-Lindenstrauss transform for Robust and secure image hashing. 10th IEEE Workshop on Multimedia and Signal Processing, Cairns, Australia; 2008, pp. 725–9.
28.
Zurück zum Zitat Swaminathan A, Mao YM, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing, Italy; 2004. pp. 355–8. Swaminathan A, Mao YM, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing, Italy; 2004. pp. 355–8.
29.
Zurück zum Zitat Lu C-S, Hsu C-Y. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimed Syst. 2005;11(2):159–73.CrossRef Lu C-S, Hsu C-Y. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimed Syst. 2005;11(2):159–73.CrossRef
30.
Zurück zum Zitat Lu C-S, Sun S-W, Hsu C-Y, Chang P-C. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Trans Multimed. 2006;8(4):668–85.CrossRef Lu C-S, Sun S-W, Hsu C-Y, Chang P-C. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Trans Multimed. 2006;8(4):668–85.CrossRef
31.
Zurück zum Zitat Deng C, Gao X, Tao D, Li X. Geometrically invariant watermarking using affine covariant regions. Int. Conf. Image Processing, USA; 2008. pp. 413–6. Deng C, Gao X, Tao D, Li X. Geometrically invariant watermarking using affine covariant regions. Int. Conf. Image Processing, USA; 2008. pp. 413–6.
32.
Zurück zum Zitat Chan CS, Chang CC. An efficient image authentication method based on hamming code. Pattern Recognit. 2007;40(2):681–90.CrossRefMATH Chan CS, Chang CC. An efficient image authentication method based on hamming code. Pattern Recognit. 2007;40(2):681–90.CrossRefMATH
33.
Zurück zum Zitat Chan CS. An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit Lett. 2011;32:1679–90.CrossRef Chan CS. An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit Lett. 2011;32:1679–90.CrossRef
34.
Zurück zum Zitat Tang Z, Zhang X, Huang L, Dai Y. Robust image hashing using ring-based entropies. Signal Process. 2013;93:2061–9.CrossRef Tang Z, Zhang X, Huang L, Dai Y. Robust image hashing using ring-based entropies. Signal Process. 2013;93:2061–9.CrossRef
35.
Zurück zum Zitat Coskun B, Memon N. Confusion/Diffusion capabilities of some robust hash functions. Proc. 40th Annual Conf. on Information Sciences and Systems. Princeton, NJ, pp. 1188–93; 2006. Coskun B, Memon N. Confusion/Diffusion capabilities of some robust hash functions. Proc. 40th Annual Conf. on Information Sciences and Systems. Princeton, NJ, pp. 1188–93; 2006.
36.
Zurück zum Zitat Stallings W. Cryptography and network security: principles and practices. Chapter 6. Prentice Hall: Pearson Education, Inc.; 2006. pp. 191–4. Stallings W. Cryptography and network security: principles and practices. Chapter 6. Prentice Hall: Pearson Education, Inc.; 2006. pp. 191–4.
37.
Zurück zum Zitat Ahmed F, Siyal MY. A robust and secure signature scheme for video authentication. IEEE International Conference on Multimedia and Expo, Beijing; 2007. pp. 2126–9. Ahmed F, Siyal MY. A robust and secure signature scheme for video authentication. IEEE International Conference on Multimedia and Expo, Beijing; 2007. pp. 2126–9.
Metadaten
Titel
Hash-Based Authentication of Digital Images in Noisy Channels
verfasst von
Fawad Ahmed
Amir Anees
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-13156-6_1

Neuer Inhalt