Image Authentication for Permissible Cropping
In a digital society, it is not easy to achieve a balance between privacy and authentication. Privacy requires some modifications of the original image and signed data, but image authentication needs to ensure its integrity as much as possible. The most common method of privacy protecting is deleting some sensitive data in the original data. In this paper, we propose a practical scheme of image authentication for permissible cropping operation, using a textbook RSA signature scheme and a message commitment scheme. The security of our scheme is implied by the security of underlying cryptographic primitives. Experimental results show that the proposed scheme is practical and can be embedded in some on-line systems.
KeywordsImage authentication Textbook RSA signature Commitment Image cropping
The authors would like to thank anonymous reviewers for their helpful comments.
- 3.Chang, E., Lim, C.L., Xu, J.: Short redactable signatures using random trees. IACR Cryptology ePrint Archive 2009, vol. 25 (2009)Google Scholar
- 6.Kim, J., Lee, S., Yoon, J., Ko, H., Kim, S., Oh, H.: PASS: privacy aware secure signature scheme for surveillance systems. In: 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2017, Lecce, Italy, 29 August–1 September 2017, pp. 1–6 (2017)Google Scholar
- 9.Naveh, A., Tromer, E.: Photoproof: cryptographic image authentication for any set of permissible transformations. In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22–26 May 2016, pp. 255–271 (2016)Google Scholar
- 10.Okawa, M.: Offline signature verification with VLAD using fused KAZE features from foreground and background signature images. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR 2017, Kyoto, Japan, 9–15 November 2017, pp. 1198–1203 (2017)Google Scholar
- 11.Ozdil, O., Esin, Y.E., Demirel, B.: Forming representative signature for vegetation detection in hyperspectral images. In: 25th Signal Processing and Communications Applications Conference, SIU 2017, Antalya, Turkey, 15–18 May 2017, pp. 1–4 (2017)Google Scholar
- 12.Rehman, O., Zivic, N.: A robust watermarking technique for image content authentication. In: Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, 3–6 September 2017, pp. 223–226 (2017)Google Scholar
- 13.Schneider, M., Chang, S.: A robust content based digital signature for image authentication. In: Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996, pp. 227–230 (1996)Google Scholar
- 14.Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. IACR Cryptology ePrint Archive 2002, vol. 16 (2002)Google Scholar
- 15.Wang, C., Zhang, H., Zhou, X.: Review on self-embedding fragile watermarking for image authentication and self-recovery. JIPS 14(2), 510–522 (2018)Google Scholar
- 16.Wang, H., Ma, J.: A classification method of multispectral images which is based on fuzzy SVM. In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, Wuhan, China, 12–14 December 2008, pp. 815–818 (2008)Google Scholar
- 19.Zhuvikin, A., Korzhik, V.I., Morales-Luna, G.: Semi-fragile image authentication based on CFD and 3-bit quantization. CoRR abs/1608.02291 (2016)Google Scholar