Invertible authentication

被引:376
作者
Fridrich, J [1 ]
Gojan, M [1 ]
Du, R [1 ]
机构
[1] SUNY Binghamton, Ctr Intelligent Syst, Binghamton, NY 13902 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III | 2001年 / 4314卷
关键词
digital watermarking; steganography; invertible; lossless authentication; fragile watermarks; hash; encryption; tamper detection; image integrity;
D O I
10.1117/12.435400
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two new methods for authentication of digital images using invertible watermarking. While virtually all watermarking schemes introduce some small amount of non-invertible distortion in the image, the new methods are invertible in the sense that, if the image is deemed authentic, the distortion due to authentication can be removed to obtain the original image data. Two techniques are proposed: one is based on robust spatial additive watermarks combined with modulo addition and the second one on lossless compression and encryption of bit-planes. Both techniques provide cryptographic strength in verifying the image integrity in the sense that the probability of making a modification to the image that will not be detected can be directly related to a secure cryptographic element, such as a hash function. The second technique can be generalized to other data types than bitmap images. As an example, a lossless authentication method for JPEG files is presented and some results discussed. In the paper, we also explain that invertible authentication can only be achieved at the expense of not being able to authenticate every possible image. However, it is argued that all images that occur in practice can be authenticated. The techniques provide new information assurance tools for integrity protection of sensitive imagery, such as medical images or images viewed under non-standard conditions when usual criteria for visibility do not apply.
引用
收藏
页码:197 / 208
页数:12
相关论文
共 15 条
  • [1] [Anonymous], S CONT SEC DAT HID D
  • [2] CHANG SF, 2000, P SPIE SEC WAT MULT, P140
  • [3] Symmetric ciphers based on two-dimensional chaotic maps
    Fridrich, J
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
  • [4] FRIDRICH J, 1999, ICIP 99 KOB JAP OCT
  • [5] Fridrich J., 1997, SECURE IMAGE CIPHERI
  • [6] HERRIGEL A, 1998, P 2 INT INF HID WORK
  • [7] HONSINGER CW, 2000, P PICS 00 PORTL OR M
  • [8] HONSINGER CW, 1999, LOSSLESS RECOVERY OR
  • [9] HONSINGER CW, 2000, COMMUNICATION SEP
  • [10] KUNDUR D, 1998, P ICIP CHIC IL OCT