Skip to main content

A Hybrid Content-Based Image Authentication Scheme

  • Conference paper
Book cover Advances in Multimedia Information Processing – PCM 2007 (PCM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4810))

Included in the following conference series:

Abstract

In this paper, we propose a hybrid content-based image authentication scheme that integrates two complementary algorithms: Robust content-based authentication and semi-fragile crypto-hash based authentication. The former uses global features and is quite robust against various types of noise. The latter uses local features and therefore is able to identify the tempered area in case the image is attacked. The proposed scheme takes advantage from both algorithms and provides more information to guide the decision maker. In addition, we also propose two improved algorithms based on Fridrich’s content-based and Sun’s crypto-hash based authentication. Experiments show that the improved algorithms are more secure than the original algorithms. Another contribution of this paper is that, by concatenating the signatures generated with two different authentication algorithms, the fuzzy area in authentication decision can be further quantized, which provides more choices for authentication decision.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fei, C., Kundur, D., Kwong, R.: Analysis and Design of Secure Watermark-based Authentication Systems. IEEE Transactions on Information Forensics and Security 1(1), 43–55 (2006)

    Article  Google Scholar 

  2. Wu, C.W.: On the Design of Content-Based Multimedia Authentication Systems, IBM Research Report (2001)

    Google Scholar 

  3. Lin, C.Y., Chang, S.F.: A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation. IEEE Trans. on Circuits and Systems for Video Technology (2001)

    Google Scholar 

  4. Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: EI 2000. SPIE Security and Watermarking of Multimedia Contents II (2000)

    Google Scholar 

  5. Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: ISNN 2006, vol. 3971, pp. 152–163 (2000)

    Google Scholar 

  6. Fridrich, J.: Robust Bit Extraction From Images. In: Proc. IEEE ICMCS 1999, Florence, Italy, vol. 2, pp. 536–540 (1999)

    Google Scholar 

  7. Eggers, J.J., Girod, B.: Blind watermarking applied to image authentication. In: ICASSP 2001. Intern. Conference on Acoustics, Speech and Signal Processing (2001)

    Google Scholar 

  8. Queluz, M.P.: Authentication of digital images and video: Generic models and a new contribution. Signal processing: Image communication 16, 461–475 (2001)

    Article  Google Scholar 

  9. Queluz, M.P.: Spatial Watermark for Image Content Authentication. Journal of Electronic Imaging 11(2), 275–285 (2002)

    Article  Google Scholar 

  10. Sun, Q., Tian, Q., Chang, S.F.: A Robust and Secure Media Signature Scheme for JPEG Images. IEEE MMSP (2002)

    Google Scholar 

  11. Radhakrishnan, R., Xiong, Z., Memom, N.: On the security of the visual hash function. In: Proceedings SPIE - Security and Watermarking of Multimedia Contents V, vol. 5020 (2003)

    Google Scholar 

  12. Ye, S., Sun, Q., Chang, E.-C.: Error Resilient Content-based Image Authentication Over Wireless Channel. In: ISCAS. IEEE International Symposium on Circuits and Systems (2005)

    Google Scholar 

  13. Chou, W.: Classifying Image Pixels into Shaped, Smooth and Textured Points. Pattern Recognition 32(10), 1697–1706 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Horace H.-S. Ip Oscar C. Au Howard Leung Ming-Ting Sun Wei-Ying Ma Shi-Min Hu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, K., Zhu, X., Zhang, Z. (2007). A Hybrid Content-Based Image Authentication Scheme. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77255-2_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77254-5

  • Online ISBN: 978-3-540-77255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics