Skip to main content

Hash-Based Authentication of Digital Images in Noisy Channels

  • Chapter
  • First Online:
Robust Image Authentication in the Presence of Noise

Abstract

The advancement in digital technology has provided us with a number of software tools that can be used to tamper digital media contents, for example, images. This creates several challenges in case if a digital image is to be used as a legal evidence. Can we use traditional cryto-hashing and digital signatures to meet the integrity and authentication requirements of digital images? Considering an image as a data stream, cryptographic hash functions like Secure Hash Algorithm 1 (SHA1) along with the Rivest Shamir Adleman (RSA) algorithm can be used for integrity verification and authentication. One of the earliest work to adapt this approach was done by Friedman. There are, however, several reasons that actually impede the direct use of cryptographic techniques for solving multimedia security problems. Unlike textual data that is transmitted through a lossless medium, multimedia data like audio, image and video may be transmitted and stored using a lossy medium to save bandwidth and storage space. Therefore, using traditional cryptographic hash functions for integrity verification and authentication of multimedia content has a problem that a single bit change in the content due to lossy medium will significantly change the hash value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li W, Yuan Y, Yu N. Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process; in press.

    Google Scholar 

  2. Vanstone SA, Menezes AJ, Oorschot PC. Handbook of applied cryptography. Boca Raton: CRC Press; 1996.

    Google Scholar 

  3. Friedman GL. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron. 1993;39(4):905–10.

    Article  Google Scholar 

  4. Zeng W, Yu H, Lin C-Y. Multimedia security technologies for digital rights managements. Burlington: Elsevier Inc.; 2006.

    Google Scholar 

  5. Furht B, Kirovski D. Multimedia security handbook. Boca Raton: CRC Press; 2005.

    Google Scholar 

  6. Lian S. Multimedia content encryption: techniques and applications. Boca Raton: CRC Press; 2008.

    Google Scholar 

  7. Ahmed F, Siyal MY, Abbas V-U. A secure and robust hash-based scheme for image authentication. Signal Process. 2010;90(5):1456–70.

    Article  MATH  Google Scholar 

  8. Cox IJ, Miller ML, Bloom JA. Digital watermarking. San Francisco: Morgan Kaufmann Publishers, Inc.; 2001.

    Google Scholar 

  9. Schneier B. Applied cryptography. USA: Wiley; 1996.

    Google Scholar 

  10. Wong PW, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process. 2001;10(10):1593–601.

    Article  MATH  Google Scholar 

  11. Monga V, Evans BL. Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Process. 2006;15(11):3452–65.

    Google Scholar 

  12. Radhakrishnan R, Memon N. On the security of the digest function in the SARI image authentication system. IEEE Trans Circuits Syst Video Technol. 2002;12(11):1030–3.

    Article  Google Scholar 

  13. Radhakrishnan R, Xiong Z, Memon N. On the security of the visual hash function. Security and Watermarking of Multimedia Contents V. In: Delp EJ III., Wong PW, editors. SPIE vol. 5020, pp. 644–52; 2003.

    Google Scholar 

  14. Sun Q, Chang S-F. A robust and secure media signature scheme for JPEG images. J VLSI Signal Process. 2005;41:305–17.

    Article  Google Scholar 

  15. Xie L, Arce GR, Graverman RF. Approximate message authentication codes. IEEE Trans Multimed. 2001;3(2):242–52.

    Article  Google Scholar 

  16. Gravemen RF, Fu K. Approximate message authentication codes. Proc. 3rd Annual Fedlab Symp. Advanced Telecommunications Information Distribution, vol. 1, College Park, MD; 1999.

    Google Scholar 

  17. Lou D-C, Liu J-L. Fault resilient and compression tolerant signature for image authentication. IEEE Trans Consumer Electron. 2000;46(1):31–9.

    Article  Google Scholar 

  18. Lei Y, Wang Y, Huang J. Robust image hash in Radon transform domain for authentication. Signal Process: Image Commun. 2011;26:280–8.

    Google Scholar 

  19. Tang Z, Dai Y, Zhang X. Perceptual hashing for color images using invariant moments. Appl Math Inf Sci. 2012;6(2S):643S–50S.

    Google Scholar 

  20. Schneider M, Chang SF. A content based digital signature for image authentication. Int. Conf. Image Processing, Lausanne, Switzerland; 1996, pp. 227–30.

    Google Scholar 

  21. Lin CY, Chang S-F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol. 2001;11(2):153–68.

    Article  MathSciNet  Google Scholar 

  22. Uehara T, Safavi-Naini R. On (in) security of a robust image authentication method. In: Y-C Chen et al., editors. LNCS 2532, pp. 1025–32; 2002.

    Google Scholar 

  23. Zhao Y, Gu C, Wei W. Image hashing based on color histogram. J Inf Comput Sci. 2012;9(15):4397–404.

    Google Scholar 

  24. Lu CS, Liao H-YM. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed. 2003;5(2):161–73.

    Article  MathSciNet  Google Scholar 

  25. Swaminathan A, Mao Y, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing; 2004, pp. 355–8.

    Google Scholar 

  26. Monga V, Mihcak MK. Robust image hashing via non-negative matrix factorizations. IEEE Int. Conf. on Acoustic Speech and Signal Processing; 2006, pp. 225–8.

    Google Scholar 

  27. Lv X, Wang ZJ. Fast Johnson-Lindenstrauss transform for Robust and secure image hashing. 10th IEEE Workshop on Multimedia and Signal Processing, Cairns, Australia; 2008, pp. 725–9.

    Google Scholar 

  28. Swaminathan A, Mao YM, Wu M. Image hashing resilient to geometric and filtering operations. IEEE 6th Workshop on Multimedia Signal Processing, Italy; 2004. pp. 355–8.

    Google Scholar 

  29. Lu C-S, Hsu C-Y. Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimed Syst. 2005;11(2):159–73.

    Article  Google Scholar 

  30. Lu C-S, Sun S-W, Hsu C-Y, Chang P-C. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Trans Multimed. 2006;8(4):668–85.

    Article  Google Scholar 

  31. Deng C, Gao X, Tao D, Li X. Geometrically invariant watermarking using affine covariant regions. Int. Conf. Image Processing, USA; 2008. pp. 413–6.

    Google Scholar 

  32. Chan CS, Chang CC. An efficient image authentication method based on hamming code. Pattern Recognit. 2007;40(2):681–90.

    Article  MATH  Google Scholar 

  33. Chan CS. An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit Lett. 2011;32:1679–90.

    Article  Google Scholar 

  34. Tang Z, Zhang X, Huang L, Dai Y. Robust image hashing using ring-based entropies. Signal Process. 2013;93:2061–9.

    Article  Google Scholar 

  35. Coskun B, Memon N. Confusion/Diffusion capabilities of some robust hash functions. Proc. 40th Annual Conf. on Information Sciences and Systems. Princeton, NJ, pp. 1188–93; 2006.

    Google Scholar 

  36. Stallings W. Cryptography and network security: principles and practices. Chapter 6. Prentice Hall: Pearson Education, Inc.; 2006. pp. 191–4.

    Google Scholar 

  37. Ahmed F, Siyal MY. A robust and secure signature scheme for video authentication. IEEE International Conference on Multimedia and Expo, Beijing; 2007. pp. 2126–9.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fawad Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ahmed, F., Anees, A. (2015). Hash-Based Authentication of Digital Images in Noisy Channels. In: Živić, N. (eds) Robust Image Authentication in the Presence of Noise. Springer, Cham. https://doi.org/10.1007/978-3-319-13156-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13156-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13155-9

  • Online ISBN: 978-3-319-13156-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics