An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)

The demand of security is getting higher in these days due to the development of computers and Internet. In this paper, we proposed a novel image authentication scheme in frequency domain using SHA-1 that allows two parties to exchange images while guaranteeing image authentication, integrity and nonrepudiation from the image sender, over an unsecured channel. The main idea is that at sender end, an image hash of the authenticating image of size 160 bits is generated using SHA-1 and this 160 bits then encrypted by sender’s public key to produce a signature. Then the signature is embedded into cover image in frequency domain along with the authenticating image and creates stego-image with a minimum amount of perceivable degradation to the “cover” media.

[1]  Hesham Elzouka,et al.  A Survey on Digital Watermarking Technologies , 2007, Security and Management.

[2]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[3]  Sushanta Biswas,et al.  A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.

[4]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[5]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[6]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[7]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[8]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[9]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[10]  V. Sridhar,et al.  Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  Ning Liu,et al.  Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.