Image Authentication Using Robust Image Hashing with Localization and Self-Recovery

被引:0
作者
Hassan, Ammar M. [1 ]
Al-Hamadi, Ayoub [1 ]
Michaelis, Bernd [1 ]
Hasan, Yassin M. Y. [2 ]
Wahab, Mohamed A. A. [3 ]
机构
[1] Otto Von Guericke Univ, IESK, Magdeburg, Germany
[2] Taibah Univ, Comp Sc & Info Dept, Madinah, Saudi Arabia
[3] Menia Univ, Dept Elect Engn, Al Minya, Egypt
来源
WSCG 2010: COMMUNICATION PAPERS PROCEEDINGS | 2010年
关键词
Cryptographic hashing; image authentication; image hashing; watermarking;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The rapid growth of efficient tools, which generate and edit digital images demands effective methods for assuring integrity of images. A semi-fragile block-based image authentication technique is proposed which can not only localize the alteration detections but also recover the missing contents. The proposed technique distinguishes content-preserving manipulations from the content alterations using secure image hashing instead of cryptographic hashing. The original image is divided into large blocks (sub-images) which are also divided into 8x8 blocks. Secure image hashing is utilized to generate the sub-image hash (signature) which may slightly change when the content-preserving manipulations are applied. Furthermore, the sub-image code is generated using the JPEG compression scheme. Then, two sub-image hash copies and the sub-image code are embedded into relatively-distant sub-images using a doubly linked chain which prevents the vector quantization attack. The hash and code bits are robustly embedded in chosen discrete cosine transform (DCT) coefficients exploiting a property of DCT coefficients which is invariant before and after JPEG compression. The experimental results show that the proposed technique can successfully both localize and compensate the content alterations. Furthermore, it can effectively thwart many attacks such as vector quantization attacks.
引用
收藏
页码:251 / +
页数:3
相关论文
共 31 条
[1]  
[Anonymous], S CONT SEC DAT HID D
[2]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[3]  
CELIK MU, 2002, IEEE T IMAGE P, V11
[4]   Comparative evaluation of semifragile watermarking algorithms [J].
Ekici, Ö ;
Sankur, B ;
Coskun, B ;
Naci, U ;
Akcay, M .
JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (01) :209-219
[5]  
Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
[6]  
FRIDRICH J, 1999, P ICIP 99 KOB JAP
[7]  
Fridrich J., 1999, P ACM WORKSH MULT SE, P19
[8]  
HASAN YM, 2007, P IEEE ISSPIT 07 CAI
[9]  
HASAN YMY, 2004, P IEEE ISSPIT 04 ROM
[10]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441