Skip to main content
Log in

A secure and flexible authentication system for digital images

  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract.

Authentication of image data is a challenging task. Unlike data authentication systems that detect a single bit change in the data, image authentication systems must remain tolerant to changes resulting from acceptable image processing or compression algorithms while detecting malicious tampering with the image. Tolerance to the changes due to lossy compression systems is particularly important because in the majority of cases images are stored and transmitted in compressed form, and so it is important for verification to succeed if the compression is within the allowable range.

In this paper we consider an image authentication system that generates an authentication tag that can be appended to an image to allow the verifier to verify the authenticity of the image. We propose a secure, flexible, and efficeint image authentication algorithm that is tolerant to image degradation due to JPEG lossy compression within designed levels. (JPEG is the most widely used image compression system and is the de facto industry standard.) By secure we mean that the cost of the best known attack againt the system is high, by flexible we mean that the level of protection can be adjusted so that higher security can be obtained with increased length of the authentication tag, and by efficient we mean that the computation can be performed largely as part of the JPEG compression, allowing the generation of the authentication tag to be efficiently integrated into the compression system. The authentication tag consists of a number of feature codes that can be computed in parallel, and thus computing the tag is effectively equivalent to computing a single feature code. We prove the soundness of the algorithm and show the security of the system. Finally, we give the results of our experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bhattacharjee S, Kutter M (1998) Compression tolerant image authentication. In: Proceedings of the international conference on image processing, Chicago, 4-7 October 1998, pp 435-439

  2. Cheng S, Litva P, Main A (2001) Trusting drm software. In: Proceedings of the W3C workshop on DRM, January 2001. http://www.w3.org/2000/12/drm-ws/pp/cloakware.html

  3. Colbourn CJ, Dinitz JH (eds) (1996) CRC handbook of combinatorial designs. CRC Press, Boca Raton, FL

  4. Fridrich J (1998) Image watermarking for tamper detection. In: Proceedings of the international conference on image processing, Chicago, 4-7 October 1998, pp 404-408

  5. ISO/IEC (1998) MPEG Standard. http://www.mpeg.org

  6. ITU (1993) JPEG Standard: CCITT Recommendation T.81. International Telecommunications Union, Geneva

    Google Scholar 

  7. Kirovski D, Peinado M, Petitcolas FAP (2001) Digital rights management for digital cinema. In: Proceedings of Security in Imaging: Theory and Applications, international symposium on optical science and technology, San Diego, 29 July-3 August 2001, pp 105-120

  8. Lam EY, Goodman JW (2000) A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process 9:1661-1666

    Article  MATH  Google Scholar 

  9. Lin C, Chang S (1997) A robust image authentication method distinguishing JPEG compression from malicious manipulation. CU/CTR Technical Report 486-97-19

  10. Lin C-Y, Chang S-F (2001) SARI: Self-authentication-and-recovery image watermarking system. In: Proceedings of ACM Multimedia 2001, Ottawa, Ontario, Canada, 30 September-5 October 2001, pp 628-629

  11. Memon N, Shende S, Wong P (1999) On the security of the yueng-mintzer authentication watermark. In: Final program and proceedings of IS&T PICS 99, Savannah, Georgia, USA, 25-28 April 1999, pp 301-306

  12. Radhakrishnan R, Memon N (2001) On the security of the SARI image authentication system. In: Proceedings of the international conference on image processing, Thessaloniki, Greece, 7-10 October 2001, pp 971-974

  13. Stickney B (1999) MPEG-2 or MJPEG? Videomedia. Available at: http://www.videomedia.com/mpeg.htm

  14. Uehara T, Safavi-Naini R (2002) On (in)security of “a robust image authentication method”. In: Proceedings of the IEEE Pacific Rim conference on multimedia, Hsinchu, Taiwan, 16-18 December 2002, pp 1025-1032

  15. Weisstein EW (1999) Steiner system - from mathworld. MathWorld. Available at: http://mathworld.wolfram.com/SteinerSystem.html

  16. Wu M, Liu B (1999) Attacks on digital watermarks. In: Proceedings of the 33rd Asilomar conference on signals, systems, and computers, Pacific Grove, CA, 24-27 October 1999, pp 1508-1512

  17. Wu W, Liu B (1998) Watermarking for image authentication. In: Proceedings of the international conference on image processing, Chicago, 4-7 October 1998, pp 437-441

  18. Kuribayashi M, Tanaka H (2000) A watermarking scheme based on the characteristic of addition among DCT coefficients. In: Proceedings of ISW 2000: 3rd Information Security workshop, Wollongong, NSW, Australia, 20-21 December 2000, pp 1-14. Available at: http://www.itacs.uow.edu.au/ccsr/proceedings/isw2000/ index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Takeyuki Uehara.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Uehara, T., Safavi-Naini, R. & Ogunbona, P. A secure and flexible authentication system for digital images. Multimedia Systems 9, 441–456 (2004). https://doi.org/10.1007/s00530-003-0117-0

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-003-0117-0

Keywords:

Navigation