A secure and robust hash-based scheme for image authentication

被引:139
作者
Ahmed, Fawad [1 ]
Siyal, M. Y. [1 ]
Abbas, Vali Uddin [2 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[2] Natl Univ Sci & Technol, Dept Elect & Power Engn, Pakistan Navy Engn Coll, Rawalpindi, Pakistan
关键词
Randomized pixel modulation; Robustness; Tamper detection; Image security; Quantization; Hash collision; Wavelet transform; DIGITAL SIGNATURE; RESILIENT;
D O I
10.1016/j.sigpro.2009.05.024
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To authenticate an image using a hash function is a challenging task since several core issues like tamper detection, security and robustness needs to be addressed. In this paper, we propose a hash-based image authentication scheme that simultaneously attempts to address these core issues. Unlike most of the existing schemes that use secret key in the feature extraction stage, we use secret key to randomly modulate image pixels to create a transformed feature space. The key-dependent transformed feature space is then used to calculate the image hash. To reduce the size of the hash, a 4-bit quantization scheme is also proposed. The experimental results reported in this paper reveals that the proposed scheme offers good robustness against JPEG compression, low-pass and high-pass filtering. Besides being robust, the proposed hashing scheme can detect minute tampering with localization of the tampered area. These results along with the receiver operating curve (ROC) and security analysis presented in this work makes the proposed technique a candidate for practical digital image signature systems where the transmitted or stored image might undergo JPEG compression, low-pass or high-pass filtering. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1456 / 1470
页数:15
相关论文
共 32 条
[1]  
AHMED F, 2007, P 26 INT C INF COMM, P1
[2]  
Ahmed F, 2007, LECT NOTES COMPUT SC, V4352, P51
[3]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[4]   Confusion/diffusion capabilities of some robust hash functions [J].
Coskun, Baris ;
Memon, Nasir .
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, :1188-1193
[5]  
Deng C, 2007, PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P2125
[6]   Invariant Image Watermarking Based on Local Feature Regions [J].
Deng, Cheng ;
Gao, Xinbo ;
Li, Xuelong ;
Tao, Dacheng .
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, :6-+
[7]  
Deng C, 2008, IEEE IMAGE PROC, P413, DOI 10.1109/ICIP.2008.4711779
[8]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[9]  
Lefebvre F, 2003, 2003 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL 2, PROCEEDINGS, P495
[10]   Passive detection of doctored JPEG image via block artifact grid extraction [J].
Li, Weihai ;
Yuan, Yuan ;
Yu, Nenghai .
SIGNAL PROCESSING, 2009, 89 (09) :1821-1829