Summary
This chapter presents a secure and simple content-based digital signature method for verifying the image authentication under JPEG, JPEG2000 compression and scaling based on a novel concept named lowest authenticable difference (LAD). The whole method, which is extended from the crypto-based digital signature scheme, mainly consists of statistical analysis and signature generation/verification. The invariant features, which are generated from the relationship among image blocks in the spatial domain, are coded and signed by the sender’s private key to create a digital signature for each image, regardless of the image size. The main contributions of the proposed scheme are: (1) only the spatial domain is adopted during feature generation and verification, making domain transformation process unnecessary; (2) more non-malicious manipulated images (JPEG, JPEG2000 compressed and scaled images) than related studies can be authenticated by LAD, achieving a good trade-off of image authentication between fragile and robust under practical image processing; (3) non-malicious manipulation is clearly defined to meet closely the requirements of storing images or sending them over the Internet. The related analysis and discussion are presented. The experimental results indicate that the proposed method is feasible and effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bao, P., Ma, X.: Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans. Circuits and Systems for Video Technology 15, 96–102 (2005)
Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Processing 11, 585–595 (2002)
Chen, C.C., Lin, C.S.: Toward a robust image authentication method surviving JPEG lossy compression. Journal of Information and Engineering 23, 511–524 (2007)
Feng, W., Liu, Z.Q.: Bayesian structural content abstraction for region-level image authentication. In: Proc. IEEE Int’l Conf. on Computer Vision, vol. 2, pp. 1042–1047 (2005)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice-Hall, Englewood Cliffs (2002)
Hu, Y.P., Han, D.Z.: Using two semi-fragile watermark for image authentication. In: Proc. IEEE Int’l Conf. on Machine Learning and Cybernetics, vol. 9, pp. 5484–5489 (2005)
Ishihara, N., Abe, K.: A semi-fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication. IEICE Trans. Fundamentals E90-A, 1045–1054 (2007)
Khan, F., Sun, Y.: Morphological templates for extracting texture information in X-ray mammography. In: Proc. IEEE Symp. on Computer-Based Medical Systems, pp. 375–380 (2001)
Lin, C.H., Hsieh, W.S.: Applying projection and B-spline to image authentication and remedy. IEEE Trans. Consumer Electronics 49, 1234–1239 (2003)
Lin, C.H., Hsieh, W.S.: Image authentication scheme for resisting JPEG, JPEG2000 compression and scaling. IEICE Trans. Information and Systems E90-D, 126–136 (2007)
Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits and Systems for Video Technology 11, 153–168 (2001)
Linde, Y., Buzo, A., Gray, R.: An algorithm for vector quantizer design. IEEE Trans. Communications 28, 84–95 (1980)
Liu, H., Lin, J., Huang, J.: Image authentication using content based watermark. In: Proc. IEEE Int’l Symp. on Circuits and Systems, vol. 4, pp. 4014–4017 (2005)
Lu, C.S., Liao, H.Y.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Processing 10, 1579–1592 (2001)
Lu, C.S., Liao, H.Y.M.: Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5, 161–173 (2003)
Monga, V., Vats, D., Evans, B.L.: Image authentication under geometric attacks via structure matching. In: Proc. IEEE Int’l Conf. on Multimedia and Expo, pp. 229–232 (2005)
Park, H.S., Ra, J.B.: Morphological image segmentation for realistic image representation preserving semantic object shapes. Optical Engineering 39, 1909–1916 (2000)
Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)
Schneider, M., Chang, S.F.: A robust content-based digital signature for image authentication. In: Proc. IEEE Int’l Conf. on Image Processing, vol. 3, pp. 227–230 (1996)
Sun, Q., Chang, S.F.: A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans. on Multimedia 7, 480–494 (2005)
Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proc. IEEE Int’l Conf. on Image Processing, vol. 3, pp. 664–666 (2000)
Wu, Y.T., Shih, F.Y.: An adjusted-purpose digital watermarking technique. Pattern Recognition 37, 2349–2359 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lin, CH., Hsieh, WS. (2009). Semi-fragile Image Authentication Method for Robust to JPEG, JPEG2000 Compressed and Scaled Images. In: Pan, JS., Huang, HC., Jain, L.C. (eds) Information Hiding and Applications. Studies in Computational Intelligence, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02335-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-02335-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02334-7
Online ISBN: 978-3-642-02335-4
eBook Packages: EngineeringEngineering (R0)