Secure and incidental distortion tolerant digital signature for image authentication

被引:11
|
作者
Zhang, Yong-Dong [1 ]
Tang, Sheng [1 ]
Li, Jin-Tao [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Key Lab Intelligent Informat, Beijing 100080, Peoples R China
关键词
image authentication; digital signature; PCA (Principal Component Analysis); Hotelling's T-square statistic;
D O I
10.1007/s11390-007-9079-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable '' block-edge image '', i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.
引用
收藏
页码:618 / 625
页数:8
相关论文
共 50 条
  • [11] Digital Image Authentication and Encryption using Digital Signature
    Alam, Shahzad
    Jamil, Amir
    Saldhi, Ankur
    Ahmad, Musheer
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 332 - 336
  • [12] Digital Signature Verification Scheme for Image Authentication
    Singh, Manpreet
    Kaur, Harpreet
    Kakkar, Ajay
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [13] Combined digital signature and digital watermark scheme for image authentication
    Chen, T
    Wang, JC
    Zhou, YL
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E78 - E82
  • [14] A robust content based digital signature for image authentication
    Schneider, M
    Chang, SF
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 227 - 230
  • [15] Secure fragile digital watermarking technique for image authentication
    Alturki, F
    Mersereau, R
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1031 - 1034
  • [16] New image authentication scheme based on digital signature
    Liu, BF
    Zhang, WJ
    Yu, SY
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 302 - 307
  • [17] Secure Multi Server Authentication System using Elliptic Curve Digital Signature
    Manickam, S.
    Kesavaraja, D.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [18] A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018), 2018,
  • [19] Image authentication based on digital signature and semi-fragile watermarking
    Hong-Bin Zhang
    Cheng Yang
    Xiao-Mei Quan
    Journal of Computer Science and Technology, 2004, 19 : 752 - 759
  • [20] Image Feature Based Authentication and Digital Signature for Wireless Data Transmission
    Ziaullah, Mohammad
    Shetty, Prakash
    Kamal, Shoaib
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,