Image Authentication for Permissible Cropping

In a digital society, it is not easy to achieve a balance between privacy and authentication. Privacy requires some modifications of the original image and signed data, but image authentication needs to ensure its integrity as much as possible. The most common method of privacy protecting is deleting some sensitive data in the original data. In this paper, we propose a practical scheme of image authentication for permissible cropping operation, using a textbook RSA signature scheme and a message commitment scheme. The security of our scheme is implied by the security of underlying cryptographic primitives. Experimental results show that the proposed scheme is practical and can be embedded in some on-line systems.

[1]  Ron Steinfeld,et al.  Content Extraction Signatures , 2001, ICISC.

[2]  Jia Xu,et al.  Short Redactable Signatures Using Random Trees , 2009, CT-RSA.

[3]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Xiao Zhou,et al.  Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images , 2017, Future Internet.

[5]  Hervé Chabanne,et al.  Verifiable Document Redacting , 2017, ESORICS.

[6]  Guillermo Morales-Luna,et al.  Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization , 2016, ArXiv.

[7]  Eran Tromer,et al.  PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[8]  Hyunok Oh,et al.  PASS: Privacy aware secure signature scheme for surveillance systems , 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[9]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Xiao Zhou,et al.  Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery , 2018, J. Inf. Process. Syst..

[11]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[12]  Berkan Demirel,et al.  Forming representative signature for vegetation detection in hyperspectral images , 2017, 2017 25th Signal Processing and Communications Applications Conference (SIU).

[13]  Natasa Zivic,et al.  A Robust Watermarking Technique for Image Content Authentication , 2017, FedCSIS.

[14]  Chia-Chen Lin,et al.  Blind Dual Watermarking for Color Images’ Authentication and Copyright Protection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Huai-bin Wang,et al.  A Classification Method of Multispectral Images Which Is Based on Fuzzy SVM , 2008, 2008 International Conference on Computer Science and Software Engineering.

[16]  Manabu Okawa,et al.  Offline Signature Verification with VLAD Using Fused KAZE Features from Foreground and Background Signature Images , 2017, 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR).

[17]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[18]  Hazem Al-Otum Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..