Title :
A unified approach to secure and robust hashing scheme for image and video authentication
Author :
Jamil, Nighat ; Aziz, Arshad
Author_Institution :
Dept. of Electr. Eng., Nat. Univ. of Sci. & Technol., Karachi, Pakistan
Abstract :
The advancing world of communication is faced with challenging problems related to security and authenticity. In the context of multimedia communication, digital images and videos have been endangered with spatio-temporal manipulations. In this paper, a robust and secure hashing scheme based on DWT for the image and video authentication has been presented. For the image, the hashing scheme robustness allows the acceptable manipulations such as JPEG compression and low pass filtering and at the same time is sensitive enough to detect malicious manipulations. The adoption of DWT meets the requirement of robustness and fragility. Similarly for the video authentication, the scheme is divided into two parts: Data integrity and Source verification. Video authentication algorithm involves the DCT and special quantization scheme which makes the algorithm robust for different codec and sensitive to localize the tampered frame. Further the source verification is carried out by the use of MD5 and digital signature. Several experiments have been carried out and their results, presented in this paper, demonstrate the effectiveness of the algorithm.
Keywords :
cryptography; data integrity; discrete cosine transforms; discrete wavelet transforms; low-pass filters; message authentication; quantisation (signal); video coding; DCT; DWT; JPEG compression; MD5; acceptable manipulations; codec; data integrity; digital images; digital signature; digital videos; hashing scheme robustness; image authentication; low pass filtering; malicious manipulations; multimedia communication; source verification; spatio-temporal manipulations; special quantization scheme; video authentication; Authentication; Discrete cosine transforms; Discrete wavelet transforms; Image coding; Quantization; Robustness; Transform coding; MD5; digital signature; discrete cosine transform DCT; discrete wavelet transformation DWT; image authentication; quantization scheme; robust hashing; tamper detection; video authentication;
Conference_Titel :
Image and Signal Processing (CISP), 2010 3rd International Congress on
Conference_Location :
Yantai
Print_ISBN :
978-1-4244-6513-2
DOI :
10.1109/CISP.2010.5648278