Abstract
“A ship is always safe at the shore, but that is not what it is built for.”-Albert Einstein. The same philosophy is applied to picture files saved safety on storage devices. This is, however, not always the case. Sharing and exchanging image data through computer networks affect their security. The issue that arises is how to protect these visual contents from malicious attacks. To alleviate this problem, an image verification feature can be exploited to automatically verify the integrity of these contents. In this way, users can detect any intentional corruptions, which can occur at any time during transmission.
In the present work, we propose a selective authentication system adapted to HDR images. The main contribution consists in verifying the integrity of several parts from JPEG-HDR files by using a content-based watermarking method. Specifically, a couple of local digital thumbprint and digital signature is calculated based on the SHA-2(256 bits) secure hash algorithm. Then, a verification process is performed by using two different secret keys (private and public RSA keys). Our HDR image verification scheme is applied in the DCT transform domain and maintains backwards compatibility with the legacy JPEG standard. A performance analysis and comparison with related work demonstrate the effectiveness of the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan, C.P., Pun, C.M.: Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans. Inf. Forensics Secur. 12(9), 2144–2158 (2017)
Lin, C., Chang, S.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11(2), 153–168 (2001)
Kwon, O.J., Choi, S., Lee, B.: A watermark-based scheme for authenticating JPEG image integrity. IEEE Access 6, 46194–46205 (2018)
Mzougi, S., Ouled Zaid, A.: Privacy protection and integrity verification of HDR images. In: International Conference on Computer Graphics and Digital Image Processing (2017)
Wallace, G.K.: The JPEG still picture compression standard. Multimedia engineering digital equipment corporation Maynard, Massachusetts. IEEE Trans. Consum. Electron. 38, 1022–2027 (1992)
Ward, G., Simmons, M.: JPEG-HDR: A backwards-compatible, high dynamic range extension to JPEG. ACM SIGGRAPH Courses (2006)
FIPS PUB 180–1, NIST: Secure Hash Standard (SHS), April 1995
Rivest, R.L, Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. In: ACM Proceedings of Communications, pp. 120–126 (1978)
Clarberg, P., Hasselgren, J., Akenine-Möller, T.: High dynamic range texture compression for graphics hardware. ACM Trans. Graph. 25(3), 698–706 (2006)
Yeganeh, H., Wang, Z.: Objective quality assessment of tone-mapped images. IEEE Trans. Image Process. 22(2), 657–667 (2013)
Mittal, A., Soundararajan, R., Bovik, A.C.: Making a completely blind image quality analyzer. IEEE Signal Process. Lett. 20(3), 209–212 (2013)
Mantiuk, R., Kim, K., Rempel, A., Heidrich, W.: HDR-VDP-2: a calibrated visual metric for visibility and quality predictions in all luminance conditions. ACM Trans. Graph. 30(4) (2001)
Yuan, L., Korshunov, P., Ebrahimi, T.: Privacy-preserving photo sharing based on a secure JPEG. In: IEEE Conference on Computer Communications (2015)
Yuan, L., David McNally, D., Küpçü, A., Ebrahimi, T.: Privacy-preserving photo sharing based on a public key infrastructure. In: SPIE (2015)
Ebrahimi, T., Grosbois, R.: SSecure JPEG 2000 - JPSEC. In: ICASSP Conference Proceedings 2003, pp. 716–719 (2000)
Wonga, P.W., Memon, N.: Secret and public key authentication watermarking schemes that resist vector quantization attack. In: SPIE (2000)
Niimi, M., Masutani, F., Noda, H.: Protection of privacy in JPEG files using reversible information hiding. In: International Symposium on Intelligent Signal Processing and Communications Systems, pp. 441–446, November 2012
Dufaux, F., Ebrahimi, T.: Toward a secure JPEG. In: Proceedings of SPIE (2006)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Hachani, M., Zaid, A.O. (2019). Digital Signature Based Control Integrity for JPEG HDR Images. In: Vento, M., Percannella, G. (eds) Computer Analysis of Images and Patterns. CAIP 2019. Lecture Notes in Computer Science(), vol 11679. Springer, Cham. https://doi.org/10.1007/978-3-030-29891-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-29891-3_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29890-6
Online ISBN: 978-3-030-29891-3
eBook Packages: Computer ScienceComputer Science (R0)