Abstract
The traditional verifying evidence method in court is to check the integrity of the chain of custody of evidence. However, since the digital image can be easily transferred by Internet, it is not easy for us to keep the integrity of the chain of custody.
In this article, we use the PKI (Public-Key Infrastructure), Public-Key Cryptography and watermark techniques to design a novel testing and verifying method of digital images. The main strategy of the article is to embed encryption watermarks in the least significant bit (LSB) of digital images. With the designed method, we can check the integrity of digital images by correcting public-key without side information and protecting the watermarks without tampering or forging, even the embedded method is open. Finally the proposed method can be applied in court to digital evidence testing and verification, and used to check the admissibility of digital image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Casey, E.: Digital Evidence and Computer Crime. Academic Press, London (2000)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
Stallings, W.: Cryptography and Network Security: Principles and Practices, 2nd edn. Prentice Hall International, Englewood Cliffs (1999)
Federal Information Processing Standards: SECURE HASH STANDARD (SHA), FIPS PUB 180-1 (1993)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Cox, I., Miller, M., Bloom, J., Miller, M.: Digital Watermarking: Principles & Practice. Academic Press, London (2002)
Katzenbeisser, S., Fabian, A.P.P.: Information Hiding techniques for steganography and digital watermarking. Artech House (2000)
Adams, C., Lloyd, S.: Understanding PKI: concepts, standards, and deployment considerations, 2nd edn. Pearson Education, Inc., London (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, WC., Wen, CY., Chen, CH. (2008). Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-69304-8_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69136-5
Online ISBN: 978-3-540-69304-8
eBook Packages: Computer ScienceComputer Science (R0)