Hash-Based Authentication of Digital Images in Noisy Channels

The advancement in digital technology has provided us with a number of software tools that can be used to tamper digital media contents, for example, images. This creates several challenges in case if a digital image is to be used as a legal evidence. Can we use traditional cryto-hashing and digital signatures to meet the integrity and authentication requirements of digital images? Considering an image as a data stream, cryptographic hash functions like Secure Hash Algorithm 1 (SHA1) along with the Rivest Shamir Adleman (RSA) algorithm can be used for integrity verification and authentication. One of the earliest work to adapt this approach was done by Friedman. There are, however, several reasons that actually impede the direct use of cryptographic techniques for solving multimedia security problems. Unlike textual data that is transmitted through a lossless medium, multimedia data like audio, image and video may be transmitted and stored using a lossy medium to save bandwidth and storage space. Therefore, using traditional cryptographic hash functions for integrity verification and authentication of multimedia content has a problem that a single bit change in the content due to lossy medium will significantly change the hash value.

[1]  Regunathan Radhakrishnan,et al.  On the security of the digest function in the SARI image authentication system , 2002, IEEE Trans. Circuits Syst. Video Technol..

[2]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[3]  Reihaneh Safavi-Naini,et al.  On (In)security of "A Robust Image Authentication Method" , 2002, IEEE Pacific Rim Conference on Multimedia.

[4]  Vishal Monga,et al.  Robust Image Hashing Via Non-Negative Matrix Factorizations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[5]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[6]  Yanqiang Lei,et al.  Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..

[7]  Chin-Chen Chang,et al.  An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..

[8]  Regunathan Radhakrishnan,et al.  Security of visual hash function , 2003, IS&T/SPIE Electronic Imaging.

[9]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[10]  Shih-Fu Chang,et al.  A Robust and Secure Media Signature Scheme for JPEG Images , 2005, J. VLSI Signal Process..

[11]  Z. Jane Wang,et al.  Fast Johnson-Lindenstrauss Transform for robust and secure image hashing , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[12]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[13]  Wenjun Zeng,et al.  Multimedia Security Technologies for Digital Rights Management , 2006 .

[14]  Xuelong Li,et al.  Geometrically invariant watermarking using affine covariant regions , 2008, 2008 15th IEEE International Conference on Image Processing.

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[17]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[18]  Nenghai Yu,et al.  Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..

[19]  Chi-Shiang Chan An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..

[20]  Chun-Shien Lu,et al.  Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.

[21]  N. Memon,et al.  Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[22]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[23]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[24]  Mohammed Yakoob Siyal,et al.  A Robust and Secure Signature Scheme for Video Authentication , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[25]  Zhenjun Tang,et al.  Perceptual Hashing for Color Images Using Invariant Moments , 2012 .

[26]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[27]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[28]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[29]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[30]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[31]  Ingemar J. Cox,et al.  8 – Robust Watermarking , 2002 .