Skip to main content
Log in

Abstract

In [1–3], we have briefly introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correction coding (ECC), watermarking and cryptographic signature into one unified framework. In this paper, we first study the difference between two types of distortions, namely incidental distortions which come from the defined acceptable content manipulations such as lossy compression, and intentional distortions which come from real attacks such as content copy-paste. We then introduce a new JPEG-compliant solution under our proposed framework but with different ECC and watermarking methods. Finally system performance evaluation and analysis will be given to further demonstrate the practicability of our method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Q. Sun, S.-F. Chang, K. Maeno, and M. Suto, “A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructure,” in International Symposium on Circuits and Systems (ISCAS02), Phoneix, USA, 2002.

    Google Scholar 

  2. Q. Sun, S.-F. Chang, M. Kurato, and M. Suto, “A Quantitive Semi-Fragile JPEG2000 Image Authentication System,” in International Conference on Image Processing (ICIP02), Rochester, USA, 2002.

    Google Scholar 

  3. Q. Sun and S.-F. Chang, “Semi-fragile Image Authentication Using Generic Wavelet Domain Features and ECC,” in International Conference on Image Processing (ICIP02), Rochester, USA, 2002.

    Google Scholar 

  4. P.W. Wong and N. Memon, “Secret and Public Image Watermarking Schemes for Image Authentication and Ownership Verification,” in IEEE Transactions on Image Processing, vol. 10, no. 10, 2001, pp. 1593–1601.

    Article  MATH  Google Scholar 

  5. M. Yeung and F. Mintzer, “An Invisible Watermarking Technique for Image Verification,” in International Conference on Image Processing (ICIP97), Santa Barbara, USA, 1997.

    Google Scholar 

  6. B. Schneier, in Applied Cryptography, New York, Wiley, 1996.

    Google Scholar 

  7. G.L. Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” in IEEE Transactions on Consumer Electronics, vol. 39, no. 4, 1993, pp. 905–910.

    Article  Google Scholar 

  8. S. Walton, “Image Authentication for Aslippery New Age,” in Dr. Dobb's Journal, 1995, pp. 18–26.

  9. S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication,” in International Conference on Image Processing (ICIP98), Chicago, USA, 1998.

  10. M. Wu and B. Liu, “Watermarking for Image Authentication,” in International Conference on Image Processing (ICIP98), Chicago, USA, 1998.

  11. J. Fridrich, “Image Watermarking for Tamper Detection,” in International Conference on Image Processing (ICIP98), Chicago, USA, 1998.

  12. M. Schneider and S.-F. Chang, “A Robustcontent-Based Digital Signature for Image Authentication,” in International Conference on Image Processing (ICIP96), 1996.

  13. C.-Y. Lin and S.-F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from MaliciousManipulation,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, 2001, pp. 153–168.

    Article  MathSciNet  Google Scholar 

  14. C.-S. Lu and H.-Y. Mark Liao, “Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme,” in IEEE Trans. on Multimedia, vol. 5, no. 2, 2003, pp. 161–173.

    Article  Google Scholar 

  15. M.P. Queluz, “Content Based Integrity Protection of Digital Images,” in SPIE International Conf. on Security and Watermarking of Multimedia Contents, vol. 3657, no. 09, EI ′99, San Jose, USA, 1999.

    Google Scholar 

  16. D. Johnson and A. Menezes, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” Univ. of Waterloo, 1999, appeared in http://citeseer.nj.nec.com/johnson99elliptic.html

  17. J. Fridrich and M. Goljan, “Robust Hash Functions for Digital Watermarking,” in Proceedings of IEEE International Conference on Information Technology—Coding and Computing′00, Las Vegas, March 2000.

  18. L. Xie, G.R. Arce, and R.F. Graveman, “Approximate Image Message Authentication Codes,” in IEEE Transactions on Multimedia, vol. 3, no. 2, 2001, pp. 242–252.

    Article  Google Scholar 

  19. R. Venkatesan, S.-M. Koon, M.H. Jakubowski, and P. Moulin, “Robust Image Hashing,” in International Conference on Image Processing'00, Vancouver, Canada, 2000.

    Google Scholar 

  20. X. Wang, “Robust Digital Signature for Image Authentication,” Master Thesis, National University of Singapore, 2000.

  21. N. Memon, P. Vora, B. Yeo, and M. Yeung, “Distortion Bounded Authentication Techniques,” in Proceedings of the SPIE, Security and Watermarking of Multimedia Content II, vol. 3971, 2000, pp. 164–174.

    Article  Google Scholar 

  22. A. Juels and M. Wattenberg, “A Fuzzycommitment Scheme,” in Proceedings of ACM Conference on Computer and Communications Security′99, Singapore, 1999.

  23. C.-Y. Lin and S.-F. Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” in SPIE Security and Watermarking of Multimedia Contents II EI ′00, SanJose, CA, 2000

  24. D. Zou, C.W. Wu, G. Xuan, and Y.Q. Shi, “A Content-Based Image Authentication System with Lossless Data Hiding,” in IEEE International conference on Multimedia and Expo, 2003, pp. 213–216.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qibin Sun.

Additional information

Qibin Sun received his Doctoral degree in Electrical Engineering, from University of Science and Technology of China, P. R. China, in 1997. Since 1996, he is with the Institute for InfoComm Research, Singapore, where he is responsible for industrial as well as academic research projects in the area of face recognition, media security, image and video analysis. He worked in Columbia University during 2000-2001, as a research scientist.

Shih-Fu Chang is currently a Professor at the Department of Electrical Engineering of Columbia University. He leads Columbia University's Digital Video/Multimedia Lab (http://www.ee.columbia.edu/dvmm) and ADVENT industry-university consortium, conducting research in multimedia indexing, pervasive media, and media rights management. In addition to developing new theories and algorithms, he is also interested in applying video technology to various domains, such as a video digital library currently funded by the 5-year NSF DLI-2 initiative, a Digital News project, and a live sports video filtering project. Through collaboration with industry partners, his group has made major contributions to the development of MPEG-7 multimedia description schemes and the TREC video benchmark events. Prof. Chang actively participates in professional activities. He served as a general co-chair of ACM 8th Multimedia Conference 2000 and will participate as a Conference Co-Chair in IEEE ICME 2004. He has been a consultant in several media technology companies, and a Distinguished Lecturer in IEEE Society of Circuits and Systems. He has received a Young Investigator Award from Navy ONR, a Faculty Development Award from IBM, a CAREER Award from National Science Foundation, and three Best Paper Awards from IEEE, ACM, and SPIE in the areas of multimedia indexing and manipulation. He has also supervised several research works receiving best student paper awards in recent years.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, Q., Chang, SF. A Robust and Secure Media Signature Scheme for JPEG Images. J VLSI Sign Process Syst Sign Image Video Technol 41, 305–317 (2005). https://doi.org/10.1007/s11265-005-4154-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-005-4154-0

Keywords

Navigation