Privacy-Aware Image Authentication from Cryptographic Primitives

Image authentication is the process of verifying image origin, integrity and authenticity. In many situations, image authentication should allow reasonable image editing, which does not introduce any wrong information against the original one. While it has been studied both extensively and intensively with considerable efforts, there is no satisfactory method supporting region extraction. This paper presents a solution to address the issue of privacy protection in authenticated images. Our scheme allows anyone to extract sub-image blocks from an original image (authenticated by the image producer) and generate a proof tag to prove the credibility of the extracted image blocks. The process of proof tag generation does not require any interaction with the image producer. In addition, the image producer is able to define must-be-preserved image blocks (e.g. producer logo) during the extraction. We define the security property for the authenticated sub-images and give a generic design with two core primitives: an ordinary digital signature scheme and a cryptographic accumulator. The security of our design can be reduced to the underlying cryptographic primitives and its practical performance is demonstrated by a bunch of evaluations. We believe the proposed design, together with other image authentication methods, will further facilitate image relevant services and applications.

[1]  Wei Wu,et al.  Image Authentication for Permissible Cropping , 2018, Inscrypt.

[2]  Di Xiao,et al.  A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing , 2018, Secur. Commun. Networks.

[3]  Hyunok Oh,et al.  PASS: Privacy aware secure signature scheme for surveillance systems , 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[4]  Eran Tromer,et al.  PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[5]  R. Eswaraiah,et al.  Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest , 2015, IET Image Process..

[6]  Christian Hanser,et al.  Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives , 2015, IACR Cryptol. ePrint Arch..

[7]  Yehuda Lindell,et al.  Introduction to Modern Cryptography, Second Edition , 2014 .

[8]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[9]  Jin Li,et al.  Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..

[10]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[11]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[12]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[13]  Dong-Chul Park,et al.  Medical Image Authentication Using Hash Function and Integer Wavelet Transform , 2008, 2008 Congress on Image and Signal Processing.

[14]  Der-Chyuan Lou,et al.  A copyright protection scheme for digital images using visual cryptography technique , 2007, Comput. Stand. Interfaces.

[15]  Kwangjo Kim,et al.  Chameleon Hashing Without Key Exposure , 2004, ISC.

[16]  Giuseppe Ateniese,et al.  On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.

[17]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[18]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[19]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[20]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[21]  Jitendra Malik,et al.  Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[22]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.