Secure and incidental distortion tolerant digital signature for image authentication

被引:11
|
作者
Zhang, Yong-Dong [1 ]
Tang, Sheng [1 ]
Li, Jin-Tao [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Key Lab Intelligent Informat, Beijing 100080, Peoples R China
关键词
image authentication; digital signature; PCA (Principal Component Analysis); Hotelling's T-square statistic;
D O I
10.1007/s11390-007-9079-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable '' block-edge image '', i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.
引用
收藏
页码:618 / 625
页数:8
相关论文
共 50 条
  • [21] Image authentication based on digital signature and semi-fragile watermarking
    Zhang, HB
    Yang, C
    Quan, XM
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 752 - 759
  • [22] Energy-distortion-authentication optimized resource allocation for secure wireless image streaming
    Wang, Wei
    Peng, Dongming
    Wang, Honggang
    Sharif, Hamid
    Chen, Hsiao-Hwa
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2810 - +
  • [23] Compression tolerant image authentication
    Bhattacharjee, S
    Kutter, M
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, 1998, : 435 - 439
  • [24] A technique for secure image authentication
    Izquierdo, E
    PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 67 - 73
  • [25] A robust and secure signature scheme for video authentication
    Ahmed, Fawad
    Siyal, M. Y.
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2126 - 2129
  • [26] Secure Signature Authentication Algorithm in Mobile Internet
    Sun, Hualin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 31 - 40
  • [27] Encryption scheme with mixed homomorphic signature based on message authentication for digital image
    Yang, Jing
    Fan, Mingyu
    Wang, Guangwei
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (02): : 1201 - 1211
  • [28] On authentication, digital signatures and signature laws
    Kaijser, P
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 117 - 130
  • [29] A group digital signature technique for authentication
    Hsu, CM
    Twu, SH
    Chao, HM
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 253 - 256
  • [30] Digital Signature Protocol for Visual Authentication
    Goswami, Anirban
    Mukherjee, Ritesh
    Chowdhury, Soumit
    Ghoshal, Nabin
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) : 712 - 719