A Robust and Secure Media Signature Scheme for JPEG Images

In [1–3], we have briefly introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correction coding (ECC), watermarking and cryptographic signature into one unified framework. In this paper, we first study the difference between two types of distortions, namely incidental distortions which come from the defined acceptable content manipulations such as lossy compression, and intentional distortions which come from real attacks such as content copy-paste. We then introduce a new JPEG-compliant solution under our proposed framework but with different ECC and watermarking methods. Finally system performance evaluation and analysis will be given to further demonstrate the practicability of our method.

[1]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[2]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[4]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[5]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[6]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[7]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[8]  Shih-Fu Chang,et al.  Semi-fragile image authentication using generic wavelet domain features and ECC , 2002, Proceedings. International Conference on Image Processing.

[9]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[11]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[12]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[13]  Yun Q. Shi,et al.  A content-based image authentication system with lossless data hiding , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[14]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[15]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[16]  Shih-Fu Chang,et al.  A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[17]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[18]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[19]  Nasir D. Memon,et al.  Distortion-bounded authentication techniques , 2000, Electronic Imaging.

[20]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[21]  Shih-Fu Chang,et al.  A quantitative semi-fragile JPEG2000 image authentication system , 2002, Proceedings. International Conference on Image Processing.