Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication

In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling’s T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable “block-edge image”, i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.

[1]  Ramarathnam Venkatesan,et al.  New Iterative Geometric Methods for Robust Perceptual Image Hashing , 2001, Digital Rights Management Workshop.

[2]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[3]  J. E. Jackson A User's Guide to Principal Components , 1991 .

[4]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[5]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[6]  Mitchell D. Swanson,et al.  Multimedia Authentication and Watermarking , 2003 .

[7]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[8]  Sheng Tang,et al.  Compact and Robust Image Hashing , 2005, ICCSA.

[9]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[10]  Vishal Monga,et al.  Robust perceptual image hashing using feature points , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[11]  Jiaoying Shi,et al.  Digital watermarking systems with chaotic sequences , 1999, Electronic Imaging.

[12]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[13]  Shree K. Nayar,et al.  Clustered blockwise PCA for representing visual data , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[16]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[17]  J. Edward Jackson,et al.  A User's Guide to Principal Components: Jackson/User's Guide to Principal Components , 2004 .

[18]  Shih-Fu Chang,et al.  Robust digital signature for multimedia authentication , 2003 .

[19]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[20]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..