Image Integrity Authentication Scheme Based on Fixed Point Theory

被引:17
作者
Li, Xu [1 ,2 ]
Sun, Xingming [3 ]
Liu, Quansheng [4 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] Changsha Univ Sci & Technol, Coll Math & Comp Sci, Changsha 410004, Hunan, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[4] Univ Bretagne Sud, Lab Microorganisms & Act Biomol, F-56000 Vannes, France
基金
中国国家自然科学基金;
关键词
Integrity authentication; fixed point image; Gaussian convolution and deconvolution (GCD); SEMI-FRAGILE WATERMARKING;
D O I
10.1109/TIP.2014.2372473
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Based on the fixed point theory, this paper proposes a new scheme for image integrity authentication, which is very different from digital signature and fragile watermarking. By the new scheme, the sender transforms an original image into a fixed point image (very close to the original one) of a well-chosen transform and sends the fixed point image (instead of the original one) to the receiver; using the same transform, the receiver checks the integrity of the received image by testing whether it is a fixed point image and locates the tampered areas if the image has been modified during the transmission. A realization of the new scheme is based on Gaussian convolution and deconvolution (GCD) transform, for which an existence theorem of fixed points is proved. The semifragility is analyzed via commutativity of transforms, and three commutativity theorems are found for the GCD transform. Three iterative algorithms are presented for finding a fixed point image with a few numbers of iterations, and for the whole procedure of image integrity authentication; a fragile authentication system and a semifragile one are separately built. Experiments show that both the systems have good performance in transparence, fragility, security, and tampering localization. In particular, the semifragile system can perfectly resist the rotation by a multiple of 90 degrees flipping and brightness attacks.
引用
收藏
页码:632 / 645
页数:14
相关论文
共 26 条
  • [1] [Anonymous], 2012, INF SCI
  • [2] Robust Image Alignment for Tampering Detection
    Battiato, Sebastiano
    Farinella, Giovanni Maria
    Messina, Enrico
    Puglisi, Giovanni
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1105 - 1117
  • [3] Fridrich J., 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359), P301, DOI 10.1109/ISSPA.1999.818172
  • [4] THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE
    FRIEDMAN, GL
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) : 905 - 910
  • [5] Gonzalez R.C., 2008, Digital Image Processing, V3rd, P147
  • [6] Content-based image authentication: current status, issues, and challenges
    Han, Shui-Hua
    Chu, Chao-Hsien
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (01) : 19 - 32
  • [7] Performance analysis for geometrical attack on digital image watermarking
    Jayanthi, V. E.
    Rajamani, V.
    Karthikayen, P.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS, 2011, 98 (11) : 1565 - 1580
  • [8] Li X., 2013, IMAGE INTEGRITY AUTH
  • [9] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [10] Semi-fragile watermarking for authenticating JPEG visual content
    Lin, CY
    Chang, SF
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 140 - 151