Limitations and requirements of content-based multimedia authentication systems

被引:6
|
作者
Wu, CW [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Div Res, Yorktown Hts, NY 10598 USA
关键词
data authentication; cryptography; digital signatures; hash functions; digital watermarks; digital notary;
D O I
10.1117/12.435404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.
引用
收藏
页码:241 / 252
页数:12
相关论文
共 50 条
  • [1] On the design of content-based multimedia authentication systems
    Wu, CW
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2002, 4 (03) : 385 - 393
  • [2] Formalism for content-based retrieval multimedia systems
    Wu, JK
    [J]. SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 3108 - 3113
  • [3] Multimedia systems and content-based image retrieval
    du Preez, M
    [J]. ELECTRONIC LIBRARY, 2004, 22 (03): : 287 - 287
  • [4] Multimedia systems and content-based image retrieval.
    Joshi, D
    Wang, JZ
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2005, 41 (02) : 407 - 408
  • [5] Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location
    Sakr, Ziad
    Georganas, Nicolas D.
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2007, 3 (03)
  • [6] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198
  • [7] CONTENT-BASED AUDIO AUTHENTICATION WATERMARKING
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1883 - 1892
  • [8] Content-based adaptation of streamed multimedia
    Cranley, N
    Murphy, L
    Perry, P
    [J]. MANAGEMENT OF MULTIMEDIA NETWORKS AND SERVICES, PROCEEDINGS, 2004, 3271 : 39 - 49
  • [9] Content-Based Multimedia Copy Detection
    Ouali, Chahid
    Dumouchel, Pierre
    Gupta, Vishwa
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2015, : 597 - 600
  • [10] Content-based multimedia information management
    Jain, R
    [J]. 14TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 1998, : 252 - 253