DocumentCode
63789
Title
Secure and Robust Two-Phase Image Authentication
Author
Tabatabaei, Seyed Amir Hossein ; Ur-Rehman, Obaid ; Zivic, Natasa ; Ruland, Christoph
Author_Institution
Dept. of Data Commun. Syst., Univ. of Siegen, Siegen, Germany
Volume
17
Issue
7
fYear
2015
fDate
Jul-15
Firstpage
945
Lastpage
956
Abstract
A novel two-phase robust content-based image authentication scheme is introduced. The proposed scheme is constructed based on a combination of hard and soft authentication using two existing generic approximate message authentication codes (AMACs). The AMACs combine error- correcting codes with cryptographic primitives such as message authentication codes and symmetric encryption algorithms. The message authentication codes are used for hard authentication, whereas the error-correcting codes introduce a certain degree of robustness in authentication. This is achieved by correcting minor unintentional modifications as a result of common image processing operations such as quantization , compression , and noise addition. The two-phase image authentication scheme verifies the authenticity of an image in two phases. The low frequency elements of the image in a transform domain are subjected to the first phase while some higher frequency elements are left to the second phase if the first phase succeeds. The proposed scheme tolerates common content- preserving modifications in an image but can discriminate intentional modifications affecting the image content. Mathematical bounds for the accuracy and the security level of the proposed approach are estimated and the performance is compared with some other well-known schemes in the literature. The results demonstrate that the proposed scheme shows high discriminating capability and can detect different types of meaningful forgery attacks on images while preserving the robustness. It also outperforms the benchmark image authentication schemes in terms of tradeoff between robustness and fragility.
Keywords
authorisation; cryptography; error correction codes; image coding; AMAC; content-preserving modifications; cryptographic primitives; error-correcting codes; forgery attacks; generic approximate message authentication codes; hard authentication; image processing operations; intentional modifications; mathematical bounds; secure two-phase image authentication; soft authentication; two-phase robust content-based image authentication scheme; unintentional modifications; Authentication; Discrete cosine transforms; Error correction codes; Feature extraction; Image coding; Robustness; Approximate message authentication code (AMAC); discrete cosine transform (DCT); discrete wavelet transform (DWT); error-correcting code; image authentication; unconditional security;
fLanguage
English
Journal_Title
Multimedia, IEEE Transactions on
Publisher
ieee
ISSN
1520-9210
Type
jour
DOI
10.1109/TMM.2015.2432672
Filename
7106546
Link To Document