Abstract
This paper develops a scheme for semi-fragile image authentication based on texture features and digital signature. It can detect and locate malicious manipulations made to individual image blocks, and verify the integrity of the overall image. It makes use of the invariance of Second Order Statistics (SOS) on adjacent pixels to geometric transformations which are considered as content preserving modifications. A set of characteristics are extracted from each block, then processed to form a hash to be embedded in an other distant block. Furthermore, a cryptographic digital signature is incrementally formed, in a CBC manner that renders the scheme resistant to content cutting and pasting attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Haralick, R.: Statistical and structural approaches to texture. Proc IEEE 67, 786–804 (1979)
Manjunath, B., Wu, P., Newsam, S., Shin, H.: A texture descriptor for browsing and similarity retrieval. J. of Signal Processing: Image Communication 16 (2000)
Wu, D.C., Tsai, W.H.: A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters 24, 1613–1626 (2003)
Sun, Q.B., Chang, S.F., Kurato, M., Suto, M.: A new semi-fragile image authentication framework combining ECC and PKI infrastructure. In: Proc. ISCAS 2002, Phoenix, USA (May 2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Boucherkha, A.S., Benmohamed, M. (2007). A Texture Based Image Signature Using Second Order Statistics Characterisation. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops. OTM 2007. Lecture Notes in Computer Science, vol 4805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76888-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-76888-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76887-6
Online ISBN: 978-3-540-76888-3
eBook Packages: Computer ScienceComputer Science (R0)