AACI: The mechanism for approximate authentication and correction of images

Modification of images usually originates from channel noise, image processing operations or adversary's efforts. Image authentication mechanisms protect the authenticity of images by differentiating between the effects of malicious and acceptable alterations in the original image. This paper introduces a mechanism for approximate authentication and correction of images (AACI). The proposed scheme is constructed based on two approximate message authentication code (AMAC) frameworks which use standard cryptographic primitives and error-correcting codes as their building blocks. The AACI tolerates acceptable modifications which are not effective in the image recovery process. The malicious modifications can be detected and the damaged parts can be restored by an AACI mechanism up to a certain limit. In this work, the specification of the AACI mechanism is given, proposed settings, performance and security analysis of the AACI are discussed and simulation results are presented.

[1]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[2]  Dongvu Tonien,et al.  Unconditionally Secure Approximate Message Authentication , 2009, IWCC.

[3]  Moni Naor,et al.  Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.

[4]  Harald Niederreiter,et al.  Probability and computing: randomized algorithms and probabilistic analysis , 2006, Math. Comput..

[6]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[7]  Rita Noumeir,et al.  Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.

[8]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[9]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[12]  Lize Joubert When seeing is not believing : zoology , 2014 .

[13]  Christoph Ruland,et al.  Soft Input Decryption , 2006 .

[14]  Christoph Ruland,et al.  Soft Authentication and Correction of Images , 2013 .

[15]  D. Storck,et al.  A New Approach to Integrity of Digital Images , 1996, IFIP World Conference on Mobile Communications.

[16]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[17]  Hung-Hsu Tsai,et al.  GA-based adaptive image watermarking with JND profile and fuzzy inference system , 2005 .

[18]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Natasa Zivic,et al.  Noise tolerant image authentication with error localization and correction , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[20]  Giovanni Di Crescenzo,et al.  Approximate Message Authentication and Biometric Entity Authentication , 2005, Financial Cryptography.