A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain

Image Authentication techniques enable the recipients to verify the integrity of the received image. In this paper, a semi-fragile image authentication technique based on secure hash generated with Orthogonal Polynomials based Transformation (OPT) coefficients is proposed. In this proposed scheme, the content based image feature is extracted from the OPT domain and the image hash which is used to verify the originality of the image is generated using the extracted features. In order to make the proposed scheme robust to content preserving image processing manipulations, the inter-coefficient relationship among OPT coefficients is exploited. Experimental results indicate that the proposed scheme is semi-fragile that is, the scheme is tolerant to unintentional manipulations like lossy compression and additive noise while being sensitive to malicious attacks like replace and crop.

[1]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[2]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[4]  Shengsheng Yu,et al.  Content-based watermarking scheme for image authentication , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[5]  Wen-Hsiang Tsai,et al.  Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code , 2010, Int. J. Netw. Secur..

[6]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[7]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[8]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[9]  P. D. Sheba,et al.  Selective Combinational Encryption of Gray Scale Images using Orthogonal Polynomials based Transformation , 2008 .

[10]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[11]  Po-Wei Hsu,et al.  A Fragile Associative Watermarking on 2D Barcode for Data Authentication , 2008, Int. J. Netw. Secur..

[12]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  M. Aswatha Kumar,et al.  Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .

[14]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[15]  F. Ahmed,et al.  A Secure and Robust Hashing Scheme for Image Authentication , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[16]  Qi Tian,et al.  A robust and secure media signature scheme for JPEG images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[17]  Mohan S. Kankanhalli,et al.  Robust image authentication using content based compression , 2003, Multimedia Systems.

[18]  Philip Ogunbona,et al.  A secure and flexible authentication system for digital images , 2003, Multimedia Systems.

[19]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[20]  Shih-Fu Chang,et al.  Generating Robust Digital Signature for Image/Video Authentication , 1998 .

[21]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[22]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[23]  R. Krishnamoorthi,et al.  A new data compression scheme using orthogonal polynomials , 1997, Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat..