Noise tolerant image authentication with error localization and correction

Images transmitted over insecure communication channels are protected using a message authentication code (MAC) for authenticity and integrity. Conventional MAC algorithms are in particular not suitable for image authentication over a noisy channel. Even a single bit error will render the image unauthentic and therefore being rejected. Retransmissions might not be possible over a uni-directional channel or in case of real-time transmissions where accepting a part of image might be better than having no image at all. In this paper, algorithms for image authentication, error localization in the image and their correction are proposed. Once the errors in the image are localized to a smaller area, it is shown how the errors can be corrected and if there are still some minor errors left, the soft authentication algorithm will help in partial image acceptance. Simulation results show how the algorithm reacts to bit and block errors and how the error correction and soft authentication has little or no visual impact on the resultant image quality.

[1]  Bart Preneel,et al.  MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.

[2]  Christoph Ruland,et al.  Error Correcting and Weighted Noise Tolerant Message Authentication Codes , 2011, 2011 5th International Conference on Signal Processing and Communication Systems (ICSPCS).

[3]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[4]  Dongvu Tonien,et al.  Unconditionally Secure Approximate Message Authentication , 2009, IWCC.

[5]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[6]  Giovanni Di Crescenzo,et al.  Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Charles G. Boncelet The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.

[8]  J.R. Burch,et al.  Tight integration of combinational verification methods , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).

[9]  Mark F. Flanagan,et al.  On Joint Cryptographic Verification and Channel Decoding via the Maximum Likelihood Criterion , 2012, IEEE Communications Letters.

[10]  Jianqin Zhou,et al.  On discrete cosine transform , 2011, ArXiv.

[11]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[12]  P. Yip,et al.  Fast decimation-in-time algorithms for a family of discrete sine and cosine transforms , 1984 .