A crypto signature scheme for image authentication over wireless channel

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating a watermarking solution into a traditional crypto signature scheme to make the digital signatures robust to image degradations. The proposed approach is compatible with traditional crypto signature schemes except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results as well as illustrative analysis.

[1]  Yao Wang,et al.  Error control and concealment for video communication: a review , 1998, Proc. IEEE.

[2]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[3]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[4]  Hong Heather Yu,et al.  Error concealment using data hiding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[6]  Shih-Fu Chang,et al.  Using self-authentication and recovery images for error concealment in wireless environments , 2001, SPIE ITCom.

[7]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[8]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[9]  Shih-Fu Chang,et al.  A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[10]  Chai Wah Wu,et al.  On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..

[11]  Xinggang Lin,et al.  Content based error detection and concealment for image transmission over wireless channel , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..