Abstract
In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling’s T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable “block-edge image”, i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Der-Chyuan Lou, Jiang-Lung Liu. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electronics, 2000, 46(1): 31–39.
Ching-Yung Lin, Shih-Fu Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits and Systems for Video Technology, 2001, 11(2): 153–168.
Chun-Shien Lu, H Y M Liao. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia, June 2003, pp.161–173.
Zhu B B, Swanson M D, Tewfik A H. When seeing isn’t believing — Multimedia authentication technologies. IEEE Signal Processing Magazine, 2004, 21(2): 40–49.
Zhu B B, Swanson M D. Multimedia Authentication and Watermarking. Multimedia Information Retrieval and Management, Feng D, Siu W C, Zhang H (eds.), Berlin/Heidelberg/New York: Springer-Verlag, 2003, Chap.7, pp.148–177.
Ching-Yung Lin, Shih-Fu Chang. Robust digital signature for multimedia authentication: A summary. IEEE Circuits and Systems Magazine, 2003, 3(4): 23–26.
Jin S Seo, Jaap Haitsma, Ton Kalker, Chang D Yoo. A robust image fingerprinting system using the radon transform. Signal Processing: Image Communication, 2004, 19(4): 325–339.
Monga V, Evans B L. Perceptual image hashing via feature points: Performance evaluation and trade-offs. IEEE Trans. Image Processing, Nov. 2006, 15(11): 3452–3465.
Friedman G L. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Consumer Electronics, 1993, 39(4): 905–910.
Schneider M, Shih-Fu Chang. A robust content based digital signature for image authentication. In Proc. IEEE ICIP’96, Lausanne, Switzerland, Sept. 16–19, 1996, 3: 227–230.
Bhattacharjee S, Kutter M. Compression tolerant image authentication. In Proc. IEEE Int. Conf. Image Processing (ICIP’98), Chicago, IL, October 4–7, 1998, 1: 435–439.
Mihcak K, Venkatesan R. New iterative geometric techniques for robust image hashing. In Proc. ACM Work. Security and Privacy in Dig. Rights Man., Hiladelphia, PA, USA, Nov. 2001, pp.13–21.
Monga V, Evans B L. Robust perceptual image hashing using feature points. In Proc. IEEE Int. Conf. Image Processing (ICIP 2004), Singapore, Oct., 2004, 3: 677–680.
Bian Zhao-Qi, Zhang Xue-Gong. Pattern Recognition. 2nd Edition, Beijing: Tsinghua University Press, 2000. (in Chinese)
Sheng Tang, Jin-Tao Li, Yong-Dong Zhang. Compact and robust image hashing. In Proc. International Workshop on Information Security & Hiding (ISH 2005), Singapore, Lecture Notes in Computer Science, 3481, May 2005, pp.547–556.
Hui Xiang, Lindong Wang, Hai Lin, Jiaoying Shi. Digital watermarking systems with chaotic sequences. In Proc. SPIE Conf. Security and Watermarking of Multimedia Contents, San Jose, California, January, 1999, 3657: 449–457.
Cox I J, Miller M L, Bloom J A. Digital Watermarking. New York: Morgan Kaufmann, 2001.
J Edward Jackson. A User’s Guide to Principal Components. New York: John Wiley and Sons, 1991.
Ko Nishino, Shree K Nayar, Tony Jebara. Clustered blockwise PCA for representing visual data. IEEE Trans. Pattern Analysis and Machine Intelligence, Oct. 2005, 27(10): 1675–1679.
USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/services/database/Database.html.
Fabien A P. Petitcolas. Watermarking schemes evaluation. IEEE Signal Processing Magazine, Sept. 2000, 17(5): 58–64.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by the National Natural Science Foundation of China under Grant Nos. 60473002 and 60302028, and the Beijing Science and Technology Planning Program of China (D0106008040291).
The preliminary results of this work were published in the Proceedings of the ACM Multimedia, Singapore, November 6–11, 2005, pp.523–526.
Electronic Supplementary Material
Rights and permissions
About this article
Cite this article
Zhang, YD., Tang, S. & Li, JT. Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. J Comput Sci Technol 22, 618–625 (2007). https://doi.org/10.1007/s11390-007-9079-6
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-007-9079-6