Advertisement

Perceptual Image Hashing Technique for Image Authentication in WMSNs

  • Jinse ShinEmail author
  • Christoph Ruland
Chapter

Abstract

Due to the advances in wireless networking and mobile computing techniques, multimedia data are often distributed through unreliable wireless channels where packet losses or errors may occur. In particular, Wireless Multimedia Sensor Networks (WMSNs) have been recently received a considerable attention for communicating visual data which may help in many important decision makings, so that it is necessary for a recipient to guarantee the received data are not maliciously tampered in transit and originated from a correct source device. Thus, secure multimedia communication has become a more important concern from a security perspective. However, the characteristics of WMSNs and the nature of multimedia data make data authentication schemes more complex, especially for data integrity. In this regard, this chapter addresses the high level requirements for image authentication in WMSNs, and also reviews previously published literature regarding data authentication schemes for WMSNs. Based on the requirements of image authentication in WMSNs, this chapter aims at investigating the feasibility of content based image authentication using perceptual image hashing technique as an alternative data authentication scheme in WMSNs. To do this, the performance of five selected perceptual image hashing algorithms is measured and compared with each other in terms of robustness, discriminability, and security. Finally, this chapter provides a perspective on the potential feasibility and limitations regarding the use of perceptual image hashing technique as an alternative solution to the traditional data authentication scheme in WMSNs.

Notes

Acknowledgement

This work was funded by the German Research Foundation (DFG) as part of the research training group GRK 1564 “Image New Modalities”.

References

  1. 1.
    Ahmed F, Siyal MY. A secure and robust DCT-based hashing scheme for image authentication. IEEE Int. Conf. on Commun. Syst. 2006; pp. 1–6.Google Scholar
  2. 2.
    Akyildiz IF, Melodia T. Chowdhury KR. A survey on wireless multimedia sensor networks. J Comput Netw. 2007;59:921–60.CrossRefGoogle Scholar
  3. 3.
    Boncelet C. The NTMAC for authentication of noisy messages. J IEEE Trans Inf Forensics Secur. 2006;1:35–42.CrossRefGoogle Scholar
  4. 4.
    Chang E-C, Kankanhalli MS, Guan X, Huang Z, Wu Y. Robust image authentication using content based compression. J Multimed Syst. 2003;9:121–30.CrossRefGoogle Scholar
  5. 5.
    Chen C-C, Lin C-S. Toward a robust image authentication method surviving JPEG lossy compression. J Inf Sci Eng. 2007;23:511–24.Google Scholar
  6. 6.
    Dawood MS, Ahila L, Sadasivam S. Image compression in wireless sensor networks—a survey. J Appl Inf Syst. 2012;1:11–5.Google Scholar
  7. 7.
    Graveman R, Fu K. Approximate message authentication codes. Proc. 3rd Annu. Fedlab Symp. on Adv. Telecommun./Inf. Distrib. 1999; vol. 1.Google Scholar
  8. 8.
    Guerrero-Zapata M, Zilan R, Barcel-Ordinas J, Bicakci K, Tavli B. The future of security in wireless multimedia sensor networks. J Telecommun Syst. 2010;45:77–91.CrossRefGoogle Scholar
  9. 9.
    Han S-H, Chu C-H. Content-based image authentication: current status, issues, and challenges. J Inf Secur. 2010;9:19–32.CrossRefGoogle Scholar
  10. 10.
    Haouzia A, Noumeir R. Methods for image authentication: a survey. J Multimed Tools Appl. 2008;39:1–46.CrossRefGoogle Scholar
  11. 11.
    Harjito B, Han S, Potdar V, Chang E, Xie M. Secure communication in wireless multimedia sensor networks using watermarking. Proc. 4th IEEE Int. Conf. on Digit. Ecosyst. and Technol. 2010; pp. 640–5.Google Scholar
  12. 12.
    Harjito B, Potdar V, Singh J. Watermarking technique for wireless multimedia sensor networks: a state of the art. Proc. CUBE Int. Inf. Technol. Conf. 2012; pp. 832–40.Google Scholar
  13. 13.
    ISO/IEC 9797: Information technology—security techniques—message authentication Codes (MACs); 2011.Google Scholar
  14. 14.
    Jin Y, Vural S, Gluhak A, Moessner K. Dynamic task allocation in multi-hop multimedia wireless sensor networks with low mobility. J Sens. 2013;13:13998–4028.CrossRefGoogle Scholar
  15. 15.
    Khelifi F, Jiang J. Analysis of the security of perceptual image hashing based on non-negative matrix factorization. IEEE Signal Process Lett. 2010;17:43–6.CrossRefGoogle Scholar
  16. 16.
    Kozat SS, Venkatesan R, Mihcak MK. Robust perceptual image hashing via matrix invariances. Proc. IEEE Int. Conf. on Image Process. 2004; pp. 3443–6.Google Scholar
  17. 17.
    Kundur D, Luh W, Okorafor UN, Zourntos T. Security and privacy for distributed multimedia sensor networks. Proc IEEE. 2008;96:112–30.CrossRefGoogle Scholar
  18. 18.
    Lin C-Y, Chang S-F. Semi-fragile watermarking for authenticating JPEG visual content. SPIE Secur. and Watermarking of Multimed. Contents II EI'00, SanJose, CA; 2000.Google Scholar
  19. 19.
    Lin C-Y, Chang S-F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. J IEEE Trans Circuits Syst Video Technol. 2001;11:153–68.CrossRefGoogle Scholar
  20. 20.
    Mao Y, Wu M. Unicity distance of robust image hashing. J IEEE Trans Inf Forensics Secur. 2007;2:462–7.CrossRefGoogle Scholar
  21. 21.
    Masood H, Haider U, Ur-Rehman S, Khosa I. Secure communication in WMSN. Proc. Int. Conf. on Inf. Netw. and Autom. 2010; pp. 37–42.Google Scholar
  22. 22.
    Mihcak MK, Venkatesan R. New iterative geometric methods for robust perceptual image hashing. In: Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in DRM 01, Tomas Sander, editor. London: Springer-Verlag; 2001.Google Scholar
  23. 23.
    Monga V, Evans BL. Perceptual image hashing via feature points: performance evaluation and tradeoffs. J IEEE Trans Image Process. 2006;15:3452–65.CrossRefGoogle Scholar
  24. 24.
    Monga V, Vats D, Evans BL. Image authentication under geometric attacks via structure matching. IEEE Int. Conf. on Multimed. and Expo. 2005; pp. 229–32.Google Scholar
  25. 25.
    NIST: Digital Signature Standard (DSS). Federal Information Processing Standards Publication (FIPS PUB) 186-4; 2013.Google Scholar
  26. 26.
    Paar C, Pelzl J, Preneel B. Understanding cryptography: a textbook for students and practitioners. Berlin: Springer; 2010.Google Scholar
  27. 27.
    Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: security protocols for sensor networks. J Wirel Netw. 2002;8:521–34.CrossRefzbMATHGoogle Scholar
  28. 28.
    Queluz MP. Towards robust, content based techniques for image authentication. IEEE Int. Workshop on Multimed. Signal Process. 1998; pp. 297–524.Google Scholar
  29. 29.
    Shu L, Chen Y, Zhou Z. Watermarking technologies in wireless multimedia sensor networks. IEEE COMSOC MMTC E-Letter. 2012; pp. 24–7.Google Scholar
  30. 30.
    Ur-Rehman O, Zivic N. Fuzzy authentication algorithm with applications to error localization and correction of images. J WSEAS Trans Syst. 2013;12:371–83.Google Scholar
  31. 31.
    Venkatesan R, Koon S-M, Jakubowski MH, Moulin P. Robust image hashing. IEEE Int. Conf. on Image Process. 2000; pp. 664–6.Google Scholar
  32. 32.
    Vogt H. Integrity preservation for communication in sensor networks. Technical Report 434, ETH Zrich, Institute for Pervasive Computing; February 2004.Google Scholar
  33. 33.
    Walters JP, Liang Z, Shi W, Chaudhary V. Wireless sensor network security: a survey. In: Xiao Y, editor. Security in distributed, grid, and pervasive computing. Boston: Auerbach.Google Scholar
  34. 34.
    Wang H. Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks. J Supercomput. 2013;64:883–97.CrossRefGoogle Scholar
  35. 35.
    Wang H, Peng D, Wang W, Sharif H, Chen H-H. Energy-aware adaptive watermarking for real-time image delivery in wireless sensor networks. Proc. IEEE Int. Conf. on Commun. 2008; pp. 1479–83.Google Scholar
  36. 36.
    Xie L, Arce GR, Graveman RF. Approximate image message authentication codes. J IEEE Trans Multimed. 2001;3:242–52.CrossRefGoogle Scholar
  37. 37.
    Zeng W, Yu H, Lin C-Y. Multimedia security technologies for digital rights management. Orlando: Academic Press, Inc.; 2006.Google Scholar
  38. 38.
    Zhang W, Liu Y, Das SK, De P. Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach. J Pervasive Mob Comput. 2008;4:658–80.CrossRefGoogle Scholar
  39. 39.
    Zhou H, Guan X, Wu C. Reliable transport with memory consideration in wireless sensor networks. IEEE Int. Conf. on Commun. 2008; pp. 2819–24.Google Scholar
  40. 40.
    Zhu G, Huang J, Kwong S, Yang J. A study on the randomness measure of image hashing. J IEEE Trans Inf Forensics Secur. 2009;4:928–32.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Chair for Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations