Abstract
The advancement in digital technology has provided us with a number of software tools that can be used to tamper digital media contents, for example, images. This creates several challenges in case if a digital image is to be used as a legal evidence. Can we use traditional cryto-hashing and digital signatures to meet the integrity and authentication requirements of digital images? Considering an image as a data stream, cryptographic hash functions like Secure Hash Algorithm 1 (SHA1) along with the Rivest Shamir Adleman (RSA) algorithm can be used for integrity verification and authentication. One of the earliest work to adapt this approach was done by Friedman. There are, however, several reasons that actually impede the direct use of cryptographic techniques for solving multimedia security problems. Unlike textual data that is transmitted through a lossless medium, multimedia data like audio, image and video may be transmitted and stored using a lossy medium to save bandwidth and storage space. Therefore, using traditional cryptographic hash functions for integrity verification and authentication of multimedia content has a problem that a single bit change in the content due to lossy medium will significantly change the hash value.
Keywords
- Discrete Cosine Transform
- Wavelet Coefficient
- Discrete Cosine Transform Coefficient
- Joint Photographic Expert Group
- Cryptographic Hash Function
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Li W, Yuan Y, Yu N. Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process; in press.
Vanstone SA, Menezes AJ, Oorschot PC. Handbook of applied cryptography. Boca Raton: CRC Press; 1996.
Friedman GL. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron. 1993;39(4):905–10.
Zeng W, Yu H, Lin C-Y. Multimedia security technologies for digital rights managements. Burlington: Elsevier Inc.; 2006.
Furht B, Kirovski D. Multimedia security handbook. Boca Raton: CRC Press; 2005.
Lian S. Multimedia content encryption: techniques and applications. Boca Raton: CRC Press; 2008.
Ahmed F, Siyal MY, Abbas V-U. A secure and robust hash-based scheme for image authentication. Signal Process. 2010;90(5):1456–70.
Cox IJ, Miller ML, Bloom JA. Digital watermarking. San Francisco: Morgan Kaufmann Publishers, Inc.; 2001.
Schneier B. Applied cryptography. USA: Wiley; 1996.
Wong PW, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process. 2001;10(10):1593–601.
Monga V, Evans BL. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process. 2006;15(11):3452–65.
Radhakrishnan R, Memon N. On the security of the digest function in the SARI image authentication system. IEEE Trans Circuits Syst Video Technol. 2002;12(11):1030–3.
Radhakrishnan R, Xiong Z, Memon N. On the security of the visual hash function. Security and Watermarking of Multimedia Contents V. In: Delp EJ III., Wong PW, editors. SPIE vol. 5020, pp. 644–52; 2003.
Sun Q, Chang S-F. A robust and secure media signature scheme for JPEG images. J VLSI Signal Process. 2005;41:305–17.
Xie L, Arce GR, Graverman RF. Approximate message authentication codes. IEEE Trans Multimed. 2001;3(2):242–52.
Gravemen RF, Fu K. Approximate message authentication codes. Proc. 3rd Annual Fedlab Symp. Advanced Telecommunications Information Distribution, vol. 1, College Park, MD; 1999.
Lou D-C, Liu J-L. Fault resilient and compression tolerant signature for image authentication. IEEE Trans Consumer Electron. 2000;46(1):31–9.
Lei Y, Wang Y, Huang J. Robust image hash in Radon transform domain for authentication. Signal Process: Image Commun. 2011;26:280–8.
Tang Z, Dai Y, Zhang X. Perceptual hashing for color images using invariant moments. Appl Math Inf Sci. 2012;6(2S):643S–50S.
Schneider M, Chang SF. A content based digital signature for image authentication. Int. Conf. Image Processing, Lausanne, Switzerland; 1996, pp. 227–30.
Lin CY, Chang S-F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol. 2001;11(2):153–68.
Uehara T, Safavi-Naini R. On (in) security of a robust image authentication method. In: Y-C Chen et al., editors. LNCS 2532, pp. 1025–32; 2002.
Zhao Y, Gu C, Wei W. Image hashing based on color histogram. J Inf Comput Sci. 2012;9(15):4397–404.
Lu CS, Liao H-YM. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed. 2003;5(2):161–73.
Swaminathan A, Mao Y, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing; 2004, pp. 355–8.
Monga V, Mihcak MK. Robust image hashing via non-negative matrix factorizations. IEEE Int. Conf. on Acoustic Speech and Signal Processing; 2006, pp. 225–8.
Lv X, Wang ZJ. Fast Johnson-Lindenstrauss transform for Robust and secure image hashing. 10th IEEE Workshop on Multimedia and Signal Processing, Cairns, Australia; 2008, pp. 725–9.
Swaminathan A, Mao YM, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing, Italy; 2004. pp. 355–8.
Lu C-S, Hsu C-Y. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimed Syst. 2005;11(2):159–73.
Lu C-S, Sun S-W, Hsu C-Y, Chang P-C. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Trans Multimed. 2006;8(4):668–85.
Deng C, Gao X, Tao D, Li X. Geometrically invariant watermarking using affine covariant regions. Int. Conf. Image Processing, USA; 2008. pp. 413–6.
Chan CS, Chang CC. An efficient image authentication method based on hamming code. Pattern Recognit. 2007;40(2):681–90.
Chan CS. An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit Lett. 2011;32:1679–90.
Tang Z, Zhang X, Huang L, Dai Y. Robust image hashing using ring-based entropies. Signal Process. 2013;93:2061–9.
Coskun B, Memon N. Confusion/Diffusion capabilities of some robust hash functions. Proc. 40th Annual Conf. on Information Sciences and Systems. Princeton, NJ, pp. 1188–93; 2006.
Stallings W. Cryptography and network security: principles and practices. Chapter 6. Prentice Hall: Pearson Education, Inc.; 2006. pp. 191–4.
Ahmed F, Siyal MY. A robust and secure signature scheme for video authentication. IEEE International Conference on Multimedia and Expo, Beijing; 2007. pp. 2126–9.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ahmed, F., Anees, A. (2015). Hash-Based Authentication of Digital Images in Noisy Channels. In: Živić, N. (eds) Robust Image Authentication in the Presence of Noise. Springer, Cham. https://doi.org/10.1007/978-3-319-13156-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-13156-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13155-9
Online ISBN: 978-3-319-13156-6
eBook Packages: EngineeringEngineering (R0)