Abstract
In a digital society, it is not easy to achieve a balance between privacy and authentication. Privacy requires some modifications of the original image and signed data, but image authentication needs to ensure its integrity as much as possible. The most common method of privacy protecting is deleting some sensitive data in the original data. In this paper, we propose a practical scheme of image authentication for permissible cropping operation, using a textbook RSA signature scheme and a message commitment scheme. The security of our scheme is implied by the security of underlying cryptographic primitives. Experimental results show that the proposed scheme is practical and can be embedded in some on-line systems.
Supported by Fujian Provincial Department of Education Project (JA15635), National Natural Science Foundation of China (61822202, 61872089).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Otum, H.M.: Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)
Chabanne, H., Hugel, R., Keuffer, J.: Verifiable document redacting. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017, Part I. LNCS, vol. 10492, pp. 334–351. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66402-6_20
Chang, E., Lim, C.L., Xu, J.: Short redactable signatures using random trees. IACR Cryptology ePrint Archive 2009, vol. 25 (2009)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)
Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Trans. Inf. Forensics Secur. 6(3–2), 1066–1075 (2011)
Kim, J., Lee, S., Yoon, J., Ko, H., Kim, S., Oh, H.: PASS: privacy aware secure signature scheme for surveillance systems. In: 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2017, Lecce, Italy, 29 August–1 September 2017, pp. 1–6 (2017)
Liu, X., Lin, C., Yuan, S.: Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 28(5), 1047–1055 (2018)
Lu, C., Liao, H.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10(10), 1579–1592 (2001)
Naveh, A., Tromer, E.: Photoproof: cryptographic image authentication for any set of permissible transformations. In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22–26 May 2016, pp. 255–271 (2016)
Okawa, M.: Offline signature verification with VLAD using fused KAZE features from foreground and background signature images. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR 2017, Kyoto, Japan, 9–15 November 2017, pp. 1198–1203 (2017)
Ozdil, O., Esin, Y.E., Demirel, B.: Forming representative signature for vegetation detection in hyperspectral images. In: 25th Signal Processing and Communications Applications Conference, SIU 2017, Antalya, Turkey, 15–18 May 2017, pp. 1–4 (2017)
Rehman, O., Zivic, N.: A robust watermarking technique for image content authentication. In: Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, 3–6 September 2017, pp. 223–226 (2017)
Schneider, M., Chang, S.: A robust content based digital signature for image authentication. In: Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996, pp. 227–230 (1996)
Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. IACR Cryptology ePrint Archive 2002, vol. 16 (2002)
Wang, C., Zhang, H., Zhou, X.: Review on self-embedding fragile watermarking for image authentication and self-recovery. JIPS 14(2), 510–522 (2018)
Wang, H., Ma, J.: A classification method of multispectral images which is based on fuzzy SVM. In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, Wuhan, China, 12–14 December 2008, pp. 815–818 (2008)
Wong, P.W., Memon, N.D.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)
Yu, X., Wang, C., Zhou, X.: Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Internet 9(4), 56 (2017)
Zhuvikin, A., Korzhik, V.I., Morales-Luna, G.: Semi-fragile image authentication based on CFD and 3-bit quantization. CoRR abs/1608.02291 (2016)
Acknowledgement
The authors would like to thank anonymous reviewers for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, H., Wang, S., Zhang, H., Wu, W. (2019). Image Authentication for Permissible Cropping. In: Guo, F., Huang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2018. Lecture Notes in Computer Science(), vol 11449. Springer, Cham. https://doi.org/10.1007/978-3-030-14234-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-14234-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14233-9
Online ISBN: 978-3-030-14234-6
eBook Packages: Computer ScienceComputer Science (R0)