Secure and incidental distortion tolerant digital signature for image authentication

被引:11
|
作者
Zhang, Yong-Dong [1 ]
Tang, Sheng [1 ]
Li, Jin-Tao [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Key Lab Intelligent Informat, Beijing 100080, Peoples R China
关键词
image authentication; digital signature; PCA (Principal Component Analysis); Hotelling's T-square statistic;
D O I
10.1007/s11390-007-9079-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable '' block-edge image '', i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.
引用
收藏
页码:618 / 625
页数:8
相关论文
共 50 条
  • [41] An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process
    Yao-Chang Yu
    Ting-Wei Hou
    Medical & Biological Engineering & Computing, 2014, 52 : 449 - 457
  • [42] Electronic document authentication combining handwriting signature with digital signature
    Jin, Yong
    Qin, Yin
    Liu, Jian
    Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 1998, 26 (08):
  • [43] Novel Algorithms for Secure Medical Image Communication Using Digital Signature with Various Attacks
    Umamageswari, A.
    Suresh, G. R.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 152 - 157
  • [44] Loss-tolerant authentication with digital signatures
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2054 - 2062
  • [45] A secure and flexible authentication system for digital images
    Takeyuki Uehara
    Reihaneh Safavi-Naini
    Philip Ogunbona
    Multimedia Systems, 2004, 9 : 441 - 456
  • [46] A secure and flexible authentication system for digital images
    Uehara, T
    Safavi-Naini, R
    Ogunbona, P
    MULTIMEDIA SYSTEMS, 2004, 9 (05) : 441 - 456
  • [47] Knapsack based ECC for digital signature authentication
    Rajaram, R.
    Prabakar, M. Amutha
    Devi, M. Indra
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 384 - 392
  • [48] A Visualization Based Approach for Digital Signature Authentication
    Xu, Songhua
    Yang, Wenxia
    Lau, Francis C. M.
    COMPUTER GRAPHICS FORUM, 2009, 28 (03) : 935 - 942
  • [49] VOEvent authentication via XML digital signature
    Allen, S. L.
    ASTRONOMISCHE NACHRICHTEN, 2008, 329 (03) : 298 - 300
  • [50] Selective Image Authentication Tolerant to JPEG Compression
    Korzhik, Valery
    Zhuvikin, Aleksey
    Morales-Luna, Guilermo
    2015 6TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA), 2015,