A crypto signature scheme for image authentication over wireless channel

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating a watermarking solution into a traditional crypto signature scheme to make the digital signatures robust to image degradations. The proposed approach is compatible with traditional crypto signature schemes except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results as well as illustrative analysis.

[1]  Chai Wah Wu,et al.  On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..

[2]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[3]  Shih-Fu Chang,et al.  A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[4]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[5]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[6]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[7]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[8]  Yao Wang,et al.  Error control and concealment for video communication: a review , 1998, Proc. IEEE.

[9]  Shih-Fu Chang,et al.  Zero-error information hiding capacity of digital images , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[10]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[11]  Xinggang Lin,et al.  Content based error detection and concealment for image transmission over wireless channel , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[12]  Hong Heather Yu,et al.  Error concealment using data hiding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[13]  Shih-Fu Chang,et al.  Using self-authentication and recovery images for error concealment in wireless environments , 2001, SPIE ITCom.