Title :
Secure and Robust Two-Phase Image Authentication
Author :
Tabatabaei, Seyed Amir Hossein ; Ur-Rehman, Obaid ; Zivic, Natasa ; Ruland, Christoph
Author_Institution :
Dept. of Data Commun. Syst., Univ. of Siegen, Siegen, Germany
Abstract :
A novel two-phase robust content-based image authentication scheme is introduced. The proposed scheme is constructed based on a combination of hard and soft authentication using two existing generic approximate message authentication codes (AMACs). The AMACs combine error- correcting codes with cryptographic primitives such as message authentication codes and symmetric encryption algorithms. The message authentication codes are used for hard authentication, whereas the error-correcting codes introduce a certain degree of robustness in authentication. This is achieved by correcting minor unintentional modifications as a result of common image processing operations such as quantization , compression , and noise addition. The two-phase image authentication scheme verifies the authenticity of an image in two phases. The low frequency elements of the image in a transform domain are subjected to the first phase while some higher frequency elements are left to the second phase if the first phase succeeds. The proposed scheme tolerates common content- preserving modifications in an image but can discriminate intentional modifications affecting the image content. Mathematical bounds for the accuracy and the security level of the proposed approach are estimated and the performance is compared with some other well-known schemes in the literature. The results demonstrate that the proposed scheme shows high discriminating capability and can detect different types of meaningful forgery attacks on images while preserving the robustness. It also outperforms the benchmark image authentication schemes in terms of tradeoff between robustness and fragility.
Keywords :
authorisation; cryptography; error correction codes; image coding; AMAC; content-preserving modifications; cryptographic primitives; error-correcting codes; forgery attacks; generic approximate message authentication codes; hard authentication; image processing operations; intentional modifications; mathematical bounds; secure two-phase image authentication; soft authentication; two-phase robust content-based image authentication scheme; unintentional modifications; Authentication; Discrete cosine transforms; Error correction codes; Feature extraction; Image coding; Robustness; Approximate message authentication code (AMAC); discrete cosine transform (DCT); discrete wavelet transform (DWT); error-correcting code; image authentication; unconditional security;
Journal_Title :
Multimedia, IEEE Transactions on
DOI :
10.1109/TMM.2015.2432672