DocumentCode :
1611830
Title :
An image self-verification scheme based on the rehash technique
Author :
Lin, Min-Hui ; Hu, Yu-Chen ; Chang, Chin-Chen
Author_Institution :
Dept. of Comput. Sci. & Inf., Providence Univ., Taichung, Taiwan
Volume :
2
fYear :
2003
Firstpage :
1883
Abstract :
Nowadays, images have become an important form of expression for data communication. However, if the images get tampered during the communication, their usefulness is undermined and the resending of images can bring unnecessary workload to network. Therefore, it is quite an important issue to maximize the usefulness of images even if the images have been tampered. To assure the authenticity and usefulness of images that have been tampered, this paper used modified Du et al.\´s first level rehash to propose an image self-verification scheme. To increase the usefulness of tampered images, we manage to precisely identify which "pixels" of the tampered images have been tampered. The rightmost two bits of every pixel are used to store the authentication information, which was derived by means of the modified HIT construct procedure proposed in modified Du et al.\´s (1983) first level rehash. Before sending images, both receiver and sender have to determine a secure key SK and several hash functions, and then the senders can calculate the HIT value first and embed the value to the rightmost two bits of every pixel to generate an image containing self-verification information. Upon receiving such images, the receivers can conduct the same procedure to calculate the HIT values for the authentication. As the authentication information is directly embedded in the images, no extra transmission cost will occur. Thus, our scheme will not increase transmission cost and is considerably convenient in real practice as there is no special limitation on the hash function used in our scheme.
Keywords :
cryptography; image processing; message authentication; visual communication; HIT construct procedure; authentication information; first level rehash technique; image authentication; image self-verification scheme; keyed hash function; pixel; secure key; tampered image; Authentication; Computer science; Cost function; Data communication; Digital signatures; Focusing; Image generation; Information management; Pixel; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Technology Proceedings, 2003. ICCT 2003. International Conference on
Print_ISBN :
7-5635-0686-1
Type :
conf
DOI :
10.1109/ICCT.2003.1209895
Filename :
1209895
Link To Document :
بازگشت