›› 2007, Vol. 22 ›› Issue (4): 618-625 .

Special Issue: Artificial Intelligence and Pattern Recognition

• Articles • Previous Articles     Next Articles

Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication

Yong-Dong Zhang, Sheng Tang, and Jin-Tao Li   

  1. Key Laboratory of Intelligent Information, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China
  • Received:2006-05-15 Revised:2007-02-09 Online:2007-07-10 Published:2007-07-10

In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable ``block-edge image'', i.e., Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate content-preserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication.

Key words: distributed systems; independent processing unit (IPU); assignment problem; self-learning; optima; algorithm;

[1] Der-Chyuan Lou, Jiang-Lung Liu. Fault resilient and compression tolerant digital signature for image authentication. -\it IEEE Trans. Consumer Electronics}, 2000, 46(1): 31$\sim$39.

[2] Ching-Yung Lin, Shih-Fu Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. -\it IEEE Trans. Circuits and Systems for Video Technology}, 2001, 11(2): 153$\sim$168.

[3] Chun-Shien Lu, H Y M Liao. Structural digital signature for image authentication: An incidental distortion resistant scheme. -\it IEEE Trans. Multimedia}, June 2003, pp.161$\sim$173.

[4] Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing --Multimedia authentication technologies. -\it IEEE Signal Processing Magazine}, 2004, 21(2): 40$\sim$49.

[5] Zhu B B, Swanson M D. Multimedia Authentication and Watermarking. -Multimedia Information Retrieval and Management}, Feng D, Siu W C, Zhang H (eds.), Berlin/Heidelberg/ New York: Springer-Verlag, 2003, Chap.7, pp.148$\sim$177.

[6] Ching-Yung Lin, Shih-Fu Chang. Robust digital signature for multimedia authentication: A summary. -\it IEEE Circuits and Systems Magazine}, 2003, 3(4): 23$\sim$26.

[7] Jin S Seo, Jaap Haitsma, Ton Kalker, Chang D Yoo. A robust image fingerprinting system using the radon transform. -\it Signal Processing: Image Communication}, 2004, 19(4): 325$\sim$339.

[8] Monga V, Evans B L. Perceptual image hashing via feature points: Performance evaluation and trade-offs. -\it IEEE Trans. Image Processing}, Nov. 2006, 15(11): 3452$\sim$3465.

[9] Friedman G L. The trustworthy digital camera: Restoring credibility to the photographic image. -\it IEEE Trans. Consumer Electronics}, 1993, 39(4): 905$\sim$910.

[10] Schneider M, Shih-Fu Chang. A robust content based digital signature for image authentication. In -\it Proc. IEEE ICIP'96}, Lausanne, Switzerland, Sept. 16$\sim$19, 1996, 3: 227$\sim$230.

[11] Bhattacharjee S, Kutter M. Compression tolerant image authentication. In -\it Proc. IEEE Int. Conf. Image Processing $($ICIP'98$)$}, Chicago, IL, October 4$\sim$7, 1998, 1: 435$\sim$439.

[12] Mihcak K, Venkatesan R. New iterative geometric techniques for robust image hashing. In -\it Proc. ACM Work. Security and Privacy in Dig. Rights Man.}, Hiladelphia, PA, USA, Nov. 2001, pp.13$\sim$21.

[13] Monga V, Evans B L. Robust perceptual image hashing using feature points. In -\it Proc. IEEE Int. Conf. Image Processing $($ICIP 2004$)$}, Singapore, Oct., 2004, 3: 677$\sim$680.

[14] Bian Zhao-Qi, Zhang Xue-Gong. Pattern Recognition. 2nd Edition, Beijing: Tsinghua University Press, 2000. (in Chinese)

[15] Sheng Tang, Jin-Tao Li, Yong-Dong Zhang. Compact and robust image hashing. In -\it Proc. International Workshop on Information Security $\&$ Hiding $($ISH 2005$)$}, Singapore, -\it Lecture Notes in Computer Science}, 3481, May 2005, pp.547$\sim$556.

[16] Hui Xiang, Lindong Wang, Hai Lin, Jiaoying Shi. Digital watermarking systems with chaotic sequences. In -\it Proc. SPIE Conf. Security and Watermarking of Multimedia Contents}, San Jose, California, January, 1999, 3657: 449$\sim$457.

[17] Cox I J, Miller M L, Bloom J A. Digital Watermarking. New York: Morgan Kaufmann, 2001.

[18] J Edward Jackson. A User's Guide to Principal Components. New York: John Wiley and Sons, 1991.

[19] Ko Nishino, Shree K Nayar, Tony Jebara. Clustered blockwise PCA for representing visual data. -\it IEEE Trans. Pattern Analysis and Machine Intelligence}, Oct. 2005, 27(10): 1675$\sim$1679.

[20] USC-SIPI Image Database
[Online]. Available: http://sipi. usc.edu/services/database/Database.html.

[21] Fabien A P. Petitcolas. Watermarking schemes evaluation. -\it IEEE Signal Processing Magazine}, Sept. 2000, 17(5): 58$\sim$64.
[1] Yong-Hao Long, Yan-Cheng Chen, Xiang-Ping Chen, Xiao-Hong Shi, and Fan Zhou. Test-Driven Feature Extraction of Web Components [J]. Journal of Computer Science and Technology, 2022, 37(2): 389-404.
[2] Chun-Hui Wang, Zhi Jin, Wei Zhang, Didar Zowghi, Hai-Yan Zhao, Wen-Pin Jiao. Activity Diagram Synthesis Using Labelled Graphs and the Genetic Algorithm [J]. Journal of Computer Science and Technology, 2021, 36(6): 1388-1406.
[3] Einollah Pira. Using Markov Chain Based Estimation of Distribution Algorithm for Model-Based Safety Analysis of Graph Transformation [J]. Journal of Computer Science and Technology, 2021, 36(4): 839-855.
[4] Jun-Shi Chen, Hong An, Wen-Ting Han, Zeng Lin, Xin Liu. Towards Efficient Short-Range Pair Interaction on Sunway Many-Core Architecture [J]. Journal of Computer Science and Technology, 2021, 36(1): 123-139.
[5] Xin Li, Patrick Gardy, Yu-Xin Deng, Hiroyuki Seki. Reachability of Patterned Conditional Pushdown Systems [J]. Journal of Computer Science and Technology, 2020, 35(6): 1295-1311.
[6] Momodou L. Sanyang, Ata Kabán. Large-Scale Estimation of Distribution Algorithms with Adaptive Heavy Tailed Random Projection Ensembles [J]. Journal of Computer Science and Technology, 2019, 34(6): 1241-1257.
[7] Chi Zhang, Jun-Rong Liu, Da-Wu Gu, Wei-Jia Wang, Xiang-Jun Lu, Zheng Guo, Hai-Ning Lu. Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks [J]. Journal of Computer Science and Technology, 2019, 34(5): 1079-1095.
[8] Jie Xiao, Zhan-Hui Shi, Jian-Hui Jiang, Xu-Hua Yang, Yu-Jiao Huang, Hai-Gen Hu. A Locating Method for Reliability-Critical Gates with a Parallel-Structured Genetic Algorithm [J]. Journal of Computer Science and Technology, 2019, 34(5): 1136-1151.
[9] Mansoor Davoodi, Esmaeil Delfaraz, Sajjad Ghobadi, Mahtab Masoori. Algorithms for Handoff Minimization in Wireless Networks [J]. Journal of Computer Science and Technology, 2019, 34(4): 887-900.
[10] Wei-Bei Fan, Jian-Xi Fan, Cheng-Kuan Lin, Yan Wang, Yue-Juan Han, Ru-Chuan Wang. Optimally Embedding 3-Ary n-Cubes into Grids [J]. Journal of Computer Science and Technology, 2019, 34(2): 372-387.
[11] Wen-Guo Liu, Ling-Fang Zeng, Dan Feng, Kenneth B. Kent. ROCO: Using a Solid State Drive Cache to Improve the Performance of a Host-Aware Shingled Magnetic Recording Drive [J]. Journal of Computer Science and Technology, 2019, 34(1): 61-76.
[12] Shuai-Bing Lu, Jie Wu, Huan-Yang Zheng, Zhi-Yi Fang. On Maximum Elastic Scheduling in Cloud-Based Data Center Networks for Virtual Machines with the Hose Model [J]. Journal of Computer Science and Technology, 2019, 34(1): 185-206.
[13] Ying-Lin Zhao, Jian-Lei Yang, Wei-Sheng Zhao, Aida Todri-Sanial, Yuan-Qing Cheng. Power Supply Noise Aware Task Scheduling on Homogeneous 3D MPSoCs Considering the Thermal Constraint [J]. Journal of Computer Science and Technology, 2018, 33(5): 966-983.
[14] Ji-Zhou Luo, Sheng-Fei Shi, Guang Yang, Hong-Zhi Wang, Jian-Zhong Li. O2iJoin: An Efficient Index-Based Algorithm for Overlap Interval Join [J]. Journal of Computer Science and Technology, 2018, 33(5): 1023-1038.
[15] José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado, Héctor Zatarain-Aceves. A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem [J]. , 2018, 33(4): 823-837.
Full text



[1] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[2] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[3] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[4] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[5] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[6] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[7] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[8] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[9] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
[10] Li Minghui;. CAD System of Microprogrammed Digital Systems[J]. , 1987, 2(3): 226 -235 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved