Abstract
In this paper, we propose a hybrid content-based image authentication scheme that integrates two complementary algorithms: Robust content-based authentication and semi-fragile crypto-hash based authentication. The former uses global features and is quite robust against various types of noise. The latter uses local features and therefore is able to identify the tempered area in case the image is attacked. The proposed scheme takes advantage from both algorithms and provides more information to guide the decision maker. In addition, we also propose two improved algorithms based on Fridrich’s content-based and Sun’s crypto-hash based authentication. Experiments show that the improved algorithms are more secure than the original algorithms. Another contribution of this paper is that, by concatenating the signatures generated with two different authentication algorithms, the fuzzy area in authentication decision can be further quantized, which provides more choices for authentication decision.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fei, C., Kundur, D., Kwong, R.: Analysis and Design of Secure Watermark-based Authentication Systems. IEEE Transactions on Information Forensics and Security 1(1), 43–55 (2006)
Wu, C.W.: On the Design of Content-Based Multimedia Authentication Systems, IBM Research Report (2001)
Lin, C.Y., Chang, S.F.: A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation. IEEE Trans. on Circuits and Systems for Video Technology (2001)
Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: EI 2000. SPIE Security and Watermarking of Multimedia Contents II (2000)
Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: ISNN 2006, vol. 3971, pp. 152–163 (2000)
Fridrich, J.: Robust Bit Extraction From Images. In: Proc. IEEE ICMCS 1999, Florence, Italy, vol. 2, pp. 536–540 (1999)
Eggers, J.J., Girod, B.: Blind watermarking applied to image authentication. In: ICASSP 2001. Intern. Conference on Acoustics, Speech and Signal Processing (2001)
Queluz, M.P.: Authentication of digital images and video: Generic models and a new contribution. Signal processing: Image communication 16, 461–475 (2001)
Queluz, M.P.: Spatial Watermark for Image Content Authentication. Journal of Electronic Imaging 11(2), 275–285 (2002)
Sun, Q., Tian, Q., Chang, S.F.: A Robust and Secure Media Signature Scheme for JPEG Images. IEEE MMSP (2002)
Radhakrishnan, R., Xiong, Z., Memom, N.: On the security of the visual hash function. In: Proceedings SPIE - Security and Watermarking of Multimedia Contents V, vol. 5020 (2003)
Ye, S., Sun, Q., Chang, E.-C.: Error Resilient Content-based Image Authentication Over Wireless Channel. In: ISCAS. IEEE International Symposium on Circuits and Systems (2005)
Chou, W.: Classifying Image Pixels into Shaped, Smooth and Textured Points. Pattern Recognition 32(10), 1697–1706 (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, K., Zhu, X., Zhang, Z. (2007). A Hybrid Content-Based Image Authentication Scheme. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-77255-2_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77254-5
Online ISBN: 978-3-540-77255-2
eBook Packages: Computer ScienceComputer Science (R0)