Skip to main content

Image Authentication for Permissible Cropping

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11449))

Included in the following conference series:

Abstract

In a digital society, it is not easy to achieve a balance between privacy and authentication. Privacy requires some modifications of the original image and signed data, but image authentication needs to ensure its integrity as much as possible. The most common method of privacy protecting is deleting some sensitive data in the original data. In this paper, we propose a practical scheme of image authentication for permissible cropping operation, using a textbook RSA signature scheme and a message commitment scheme. The security of our scheme is implied by the security of underlying cryptographic primitives. Experimental results show that the proposed scheme is practical and can be embedded in some on-line systems.

Supported by Fujian Provincial Department of Education Project (JA15635), National Natural Science Foundation of China (61822202, 61872089).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Otum, H.M.: Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)

    Article  Google Scholar 

  2. Chabanne, H., Hugel, R., Keuffer, J.: Verifiable document redacting. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017, Part I. LNCS, vol. 10492, pp. 334–351. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66402-6_20

    Chapter  Google Scholar 

  3. Chang, E., Lim, C.L., Xu, J.: Short redactable signatures using random trees. IACR Cryptology ePrint Archive 2009, vol. 25 (2009)

    Google Scholar 

  4. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)

    MATH  Google Scholar 

  5. Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Trans. Inf. Forensics Secur. 6(3–2), 1066–1075 (2011)

    Article  Google Scholar 

  6. Kim, J., Lee, S., Yoon, J., Ko, H., Kim, S., Oh, H.: PASS: privacy aware secure signature scheme for surveillance systems. In: 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2017, Lecce, Italy, 29 August–1 September 2017, pp. 1–6 (2017)

    Google Scholar 

  7. Liu, X., Lin, C., Yuan, S.: Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 28(5), 1047–1055 (2018)

    Article  Google Scholar 

  8. Lu, C., Liao, H.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10(10), 1579–1592 (2001)

    Article  Google Scholar 

  9. Naveh, A., Tromer, E.: Photoproof: cryptographic image authentication for any set of permissible transformations. In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22–26 May 2016, pp. 255–271 (2016)

    Google Scholar 

  10. Okawa, M.: Offline signature verification with VLAD using fused KAZE features from foreground and background signature images. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR 2017, Kyoto, Japan, 9–15 November 2017, pp. 1198–1203 (2017)

    Google Scholar 

  11. Ozdil, O., Esin, Y.E., Demirel, B.: Forming representative signature for vegetation detection in hyperspectral images. In: 25th Signal Processing and Communications Applications Conference, SIU 2017, Antalya, Turkey, 15–18 May 2017, pp. 1–4 (2017)

    Google Scholar 

  12. Rehman, O., Zivic, N.: A robust watermarking technique for image content authentication. In: Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, 3–6 September 2017, pp. 223–226 (2017)

    Google Scholar 

  13. Schneider, M., Chang, S.: A robust content based digital signature for image authentication. In: Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996, pp. 227–230 (1996)

    Google Scholar 

  14. Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. IACR Cryptology ePrint Archive 2002, vol. 16 (2002)

    Google Scholar 

  15. Wang, C., Zhang, H., Zhou, X.: Review on self-embedding fragile watermarking for image authentication and self-recovery. JIPS 14(2), 510–522 (2018)

    Google Scholar 

  16. Wang, H., Ma, J.: A classification method of multispectral images which is based on fuzzy SVM. In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, Wuhan, China, 12–14 December 2008, pp. 815–818 (2008)

    Google Scholar 

  17. Wong, P.W., Memon, N.D.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)

    Article  Google Scholar 

  18. Yu, X., Wang, C., Zhou, X.: Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Internet 9(4), 56 (2017)

    Article  Google Scholar 

  19. Zhuvikin, A., Korzhik, V.I., Morales-Luna, G.: Semi-fragile image authentication based on CFD and 3-bit quantization. CoRR abs/1608.02291 (2016)

    Google Scholar 

Download references

Acknowledgement

The authors would like to thank anonymous reviewers for their helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, H., Wang, S., Zhang, H., Wu, W. (2019). Image Authentication for Permissible Cropping. In: Guo, F., Huang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2018. Lecture Notes in Computer Science(), vol 11449. Springer, Cham. https://doi.org/10.1007/978-3-030-14234-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14234-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14233-9

  • Online ISBN: 978-3-030-14234-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics