Image Authentication for Permissible Cropping

  • Haixia Chen
  • Shangpeng Wang
  • Hongyan Zhang
  • Wei WuEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11449)


In a digital society, it is not easy to achieve a balance between privacy and authentication. Privacy requires some modifications of the original image and signed data, but image authentication needs to ensure its integrity as much as possible. The most common method of privacy protecting is deleting some sensitive data in the original data. In this paper, we propose a practical scheme of image authentication for permissible cropping operation, using a textbook RSA signature scheme and a message commitment scheme. The security of our scheme is implied by the security of underlying cryptographic primitives. Experimental results show that the proposed scheme is practical and can be embedded in some on-line systems.


Image authentication Textbook RSA signature Commitment Image cropping 



The authors would like to thank anonymous reviewers for their helpful comments.


  1. 1.
    Al-Otum, H.M.: Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)CrossRefGoogle Scholar
  2. 2.
    Chabanne, H., Hugel, R., Keuffer, J.: Verifiable document redacting. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017, Part I. LNCS, vol. 10492, pp. 334–351. Springer, Cham (2017). Scholar
  3. 3.
    Chang, E., Lim, C.L., Xu, J.: Short redactable signatures using random trees. IACR Cryptology ePrint Archive 2009, vol. 25 (2009)Google Scholar
  4. 4.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)zbMATHGoogle Scholar
  5. 5.
    Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Trans. Inf. Forensics Secur. 6(3–2), 1066–1075 (2011)CrossRefGoogle Scholar
  6. 6.
    Kim, J., Lee, S., Yoon, J., Ko, H., Kim, S., Oh, H.: PASS: privacy aware secure signature scheme for surveillance systems. In: 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2017, Lecce, Italy, 29 August–1 September 2017, pp. 1–6 (2017)Google Scholar
  7. 7.
    Liu, X., Lin, C., Yuan, S.: Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 28(5), 1047–1055 (2018)CrossRefGoogle Scholar
  8. 8.
    Lu, C., Liao, H.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10(10), 1579–1592 (2001)CrossRefGoogle Scholar
  9. 9.
    Naveh, A., Tromer, E.: Photoproof: cryptographic image authentication for any set of permissible transformations. In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22–26 May 2016, pp. 255–271 (2016)Google Scholar
  10. 10.
    Okawa, M.: Offline signature verification with VLAD using fused KAZE features from foreground and background signature images. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR 2017, Kyoto, Japan, 9–15 November 2017, pp. 1198–1203 (2017)Google Scholar
  11. 11.
    Ozdil, O., Esin, Y.E., Demirel, B.: Forming representative signature for vegetation detection in hyperspectral images. In: 25th Signal Processing and Communications Applications Conference, SIU 2017, Antalya, Turkey, 15–18 May 2017, pp. 1–4 (2017)Google Scholar
  12. 12.
    Rehman, O., Zivic, N.: A robust watermarking technique for image content authentication. In: Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, 3–6 September 2017, pp. 223–226 (2017)Google Scholar
  13. 13.
    Schneider, M., Chang, S.: A robust content based digital signature for image authentication. In: Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996, pp. 227–230 (1996)Google Scholar
  14. 14.
    Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. IACR Cryptology ePrint Archive 2002, vol. 16 (2002)Google Scholar
  15. 15.
    Wang, C., Zhang, H., Zhou, X.: Review on self-embedding fragile watermarking for image authentication and self-recovery. JIPS 14(2), 510–522 (2018)Google Scholar
  16. 16.
    Wang, H., Ma, J.: A classification method of multispectral images which is based on fuzzy SVM. In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, Wuhan, China, 12–14 December 2008, pp. 815–818 (2008)Google Scholar
  17. 17.
    Wong, P.W., Memon, N.D.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)CrossRefGoogle Scholar
  18. 18.
    Yu, X., Wang, C., Zhou, X.: Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Internet 9(4), 56 (2017)CrossRefGoogle Scholar
  19. 19.
    Zhuvikin, A., Korzhik, V.I., Morales-Luna, G.: Semi-fragile image authentication based on CFD and 3-bit quantization. CoRR abs/1608.02291 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Haixia Chen
    • 1
    • 2
  • Shangpeng Wang
    • 2
    • 3
  • Hongyan Zhang
    • 1
    • 2
  • Wei Wu
    • 2
    • 3
    Email author
  1. 1.Concord University College Fujian Normal UniversityFuzhouChina
  2. 2.Fujian Provincial Key Lab of Network Security and CryptologyFuzhouChina
  3. 3.College of Mathematics and InformaticsFujian Normal UniversityFuzhouChina

Personalised recommendations