Skip to main content
Log in

Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling’s T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable “block-edge image”, i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Der-Chyuan Lou, Jiang-Lung Liu. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electronics, 2000, 46(1): 31–39.

    Article  Google Scholar 

  2. Ching-Yung Lin, Shih-Fu Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits and Systems for Video Technology, 2001, 11(2): 153–168.

    Article  Google Scholar 

  3. Chun-Shien Lu, H Y M Liao. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia, June 2003, pp.161–173.

  4. Zhu B B, Swanson M D, Tewfik A H. When seeing isn’t believing — Multimedia authentication technologies. IEEE Signal Processing Magazine, 2004, 21(2): 40–49.

    Article  Google Scholar 

  5. Zhu B B, Swanson M D. Multimedia Authentication and Watermarking. Multimedia Information Retrieval and Management, Feng D, Siu W C, Zhang H (eds.), Berlin/Heidelberg/New York: Springer-Verlag, 2003, Chap.7, pp.148–177.

    Google Scholar 

  6. Ching-Yung Lin, Shih-Fu Chang. Robust digital signature for multimedia authentication: A summary. IEEE Circuits and Systems Magazine, 2003, 3(4): 23–26.

    Article  Google Scholar 

  7. Jin S Seo, Jaap Haitsma, Ton Kalker, Chang D Yoo. A robust image fingerprinting system using the radon transform. Signal Processing: Image Communication, 2004, 19(4): 325–339.

    Article  Google Scholar 

  8. Monga V, Evans B L. Perceptual image hashing via feature points: Performance evaluation and trade-offs. IEEE Trans. Image Processing, Nov. 2006, 15(11): 3452–3465.

    Article  Google Scholar 

  9. Friedman G L. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Consumer Electronics, 1993, 39(4): 905–910.

    Article  Google Scholar 

  10. Schneider M, Shih-Fu Chang. A robust content based digital signature for image authentication. In Proc. IEEE ICIP’96, Lausanne, Switzerland, Sept. 16–19, 1996, 3: 227–230.

  11. Bhattacharjee S, Kutter M. Compression tolerant image authentication. In Proc. IEEE Int. Conf. Image Processing (ICIP’98), Chicago, IL, October 4–7, 1998, 1: 435–439.

  12. Mihcak K, Venkatesan R. New iterative geometric techniques for robust image hashing. In Proc. ACM Work. Security and Privacy in Dig. Rights Man., Hiladelphia, PA, USA, Nov. 2001, pp.13–21.

  13. Monga V, Evans B L. Robust perceptual image hashing using feature points. In Proc. IEEE Int. Conf. Image Processing (ICIP 2004), Singapore, Oct., 2004, 3: 677–680.

  14. Bian Zhao-Qi, Zhang Xue-Gong. Pattern Recognition. 2nd Edition, Beijing: Tsinghua University Press, 2000. (in Chinese)

    Google Scholar 

  15. Sheng Tang, Jin-Tao Li, Yong-Dong Zhang. Compact and robust image hashing. In Proc. International Workshop on Information Security & Hiding (ISH 2005), Singapore, Lecture Notes in Computer Science, 3481, May 2005, pp.547–556.

  16. Hui Xiang, Lindong Wang, Hai Lin, Jiaoying Shi. Digital watermarking systems with chaotic sequences. In Proc. SPIE Conf. Security and Watermarking of Multimedia Contents, San Jose, California, January, 1999, 3657: 449–457.

  17. Cox I J, Miller M L, Bloom J A. Digital Watermarking. New York: Morgan Kaufmann, 2001.

    Google Scholar 

  18. J Edward Jackson. A User’s Guide to Principal Components. New York: John Wiley and Sons, 1991.

    MATH  Google Scholar 

  19. Ko Nishino, Shree K Nayar, Tony Jebara. Clustered blockwise PCA for representing visual data. IEEE Trans. Pattern Analysis and Machine Intelligence, Oct. 2005, 27(10): 1675–1679.

    Article  Google Scholar 

  20. USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/services/database/Database.html.

  21. Fabien A P. Petitcolas. Watermarking schemes evaluation. IEEE Signal Processing Magazine, Sept. 2000, 17(5): 58–64.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheng Tang.

Additional information

This work was supported by the National Natural Science Foundation of China under Grant Nos. 60473002 and 60302028, and the Beijing Science and Technology Planning Program of China (D0106008040291).

The preliminary results of this work were published in the Proceedings of the ACM Multimedia, Singapore, November 6–11, 2005, pp.523–526.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, YD., Tang, S. & Li, JT. Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. J Comput Sci Technol 22, 618–625 (2007). https://doi.org/10.1007/s11390-007-9079-6

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-007-9079-6

Keywords