The CRC-NTMAC for image tamper proofing and authentication

被引:3
|
作者
Liu, Y. [1 ]
Boncelet, C. [1 ]
机构
[1] Univ Delaware, Dept Elect & Comp Engn, Newark, DE 19716 USA
关键词
security; image analysis; error analysis;
D O I
10.1109/ICIP.2006.312887
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a new approach, the image CRC Noise Tolerant Message Authentication Code (image CRC-NTMAC), to ensure the credibility of multimedia, such as images. The image CRC-NTMAC can accurately identify the specific regions of the image that have been modified and visibly display the authentication result. Moreover, the tolerance to the low rate random errors, often allowed with multimedia objects, and the sensitivity to the high noise (as forgery) allow the image CRC-NTMAC distinguishing between malicious forgeries and minor communication errors. Examples are provided for the image CRC-NTMAC demonstrating the ability to distinguish between random errors and forgeries. The image CRC-NTMAC improves on the recently developed NTMAC. As with the NTMAC, the image CRC-NTMAC can tolerate a modest number of errors. However, it has thousands of times lower collision rates than the NTMAC does, thus providing much higher possibility to detect the changes, and tolerating more random channel errors.
引用
收藏
页码:1985 / +
页数:2
相关论文
共 50 条
  • [1] The CRC-NTMAC for noisy message authentication
    Liu, Y.
    Boncelet, C.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2775 - 2781
  • [2] The CRC-NTMAC for noisy message authentication
    Liu, Yu
    Boncelet, Charles G.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) : 517 - 523
  • [3] A robust and recoverable tamper proofing technique for image authentication
    Hung, KL
    Chang, CC
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 44 - 53
  • [4] VQ attack resilient and tamper proofing digital watermark for image authentication and recovery
    Huang, PW
    Peng, AW
    Lin, PL
    CISST '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS, AND TECHNOLOGY, 2004, : 289 - 293
  • [5] Digital watermarking for telltale tamper proofing and authentication
    Kundur, D
    Hatzinakos, D
    PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1167 - 1180
  • [6] Recoverable tamper proofing technique for image authentication using irregular sampling coding
    Hung, Kuo Lung
    Chang, Chin-Chen
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 333 - +
  • [7] Semi-fragile watermarking for tamper proofing and authentication of still images
    Han, SJ
    Chang, IS
    Park, RH
    DIGITAL WATERMARKING, 2004, 2939 : 328 - 339
  • [8] The NTMAC for authentication of noisy messages
    Boncelet, Charles G., Jr.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) : 35 - 42
  • [9] A Secure Hiding Scheme for Tamper-Proofing and Authentication of Color Biometric Templates
    Ben Tarif, Eyad
    Wibowo, Santoso
    Wasimi, Saleh
    Tareef, Afaf
    Tareaf, Abedalraheem
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 141 - 146
  • [10] Using Statistical Texture Analysis for Medical Image Tamper Proofing
    Boucherkha, Samia
    Benmohamed, Mohamed
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2008, 2 (03) : 18 - 27