SCIENCE CHINA Information Sciences, Volume 63 , Issue 12 : 222301(2020) https://doi.org/10.1007/s11432-020-3007-5

Efficient and secure image authentication with robustness and versatility

More info
  • ReceivedJun 5, 2020
  • AcceptedNov 2, 2020
  • PublishedNov 11, 2020



This work was supported by National Natural Science Foundation of China (Grant Nos. 61902070, 61822202, 62032005, 61872089, 61872087).


[1] Zhang H G, Han W B, Lai X J. Survey on cyberspace security. Sci China Inf Sci, 2015, 58: 1-43 CrossRef Google Scholar

[2] Du L, Cao X, Zhang W. Semi-fragile watermarking for image authentication based on compressive sensing. Sci China Inf Sci, 2016, 59: 059104 CrossRef Google Scholar

[3] Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consumer Electron, 1993, 39: 905-910 CrossRef Google Scholar

[4] Merkle R C. A digital signature based on a conventional encryption function. In: Proceedings of Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, 1987. 369--378. Google Scholar

[5] Venkatesan R, Koon S, Jakubowski M H, et al. Robust image hashing. In: Proceedings of the 2000 International Conference on Image Processing, Vancouver, 2000. 664--666. Google Scholar

[6] Monga V, Evans B L. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs. IEEE Trans Image Process, 2006, 15: 3452-3465 CrossRef ADS Google Scholar

[7] Xiang S J, Yang J Q, Huang J W. Perceptual video hashing robust against geometric distortions. Sci China Inf Sci, 2012, 55: 1520-1527 CrossRef Google Scholar

[8] Huang F J, Huang J W. Calibration based universal JPEG steganalysis. Sci China Ser F-Inf Sci, 2009, 52: 260-268 CrossRef Google Scholar

[9] Ching-Yung Lin , Shih-Fu Chang . A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol, 2001, 11: 153-168 CrossRef Google Scholar

[10] Tang Z, Zhang X, Li X. Robust Image Hashing With Ring Partition and Invariant Vector Distance. IEEE TransInformForensic Secur, 2016, 11: 200-214 CrossRef Google Scholar

[11] Kim J, Lee S, Yoon J, et al. PASS: privacy aware secure signature scheme for surveillance systems. In: Proceedings of the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, Lecce, 2017. 1--6. Google Scholar

[12] Chen H, Wang S, Zhang H, et al. Image authentication for permissible cropping. In: Proceedings of the 14th International Conference on Information Security and Cryptology, Fuzhou, 2018. 308--325. Google Scholar

[13] Naveh A, Tromer E. Photoproof: cryptographic image authentication for any set of permissible transformations. In: Proceedings of IEEE Symposium on Security and Privacy, San Jose, 2016. 255--271. Google Scholar

[14] Ben-Sasson E, Chiesa A, Tromer E, et al. Succinct non-interactive arguments for a von neumann architecture. IACR Cryptol ePrint Archive, 2013, 2013: 879. Google Scholar

[15] Katz J, Lindell Y. Introduction to Modern Cryptography. 2nd ed. Boca Raton: CRC Press, 2014. Google Scholar

[16] Merkle R C. A certified digital signature. In: Proceedings of the 9th Annual International Cryptology Conference, Santa Barbara, 1989. 218--238. Google Scholar

[17] Liehua Xie , Arce G R, Graveman R F. Approximate image message authentication codes. IEEE Trans Multimedia, 2001, 3: 242-252 CrossRef Google Scholar

[18] Tang Z, Zhang X, Huang L. Robust image hashing using ring-based entropies. Signal Processing, 2013, 93: 2061-2069 CrossRef Google Scholar

[19] Xiang S, Kim H, Huang J. Histogram-based image hashing scheme robust against geometric deformations. In: Proceedings of the 9th Workshop on Multimedia & Security, Dallas, 2007. 121--128. Google Scholar

[20] Choi Y S, Park J H. Image hash generation method using hierarchical histogram. Multimed Tools Appl, 2012, 61: 181-194 CrossRef Google Scholar

[21] Tang Z, Dai Y, Zhang X, et al. Perceptual image hashing with histogram of color vector angles. In: Proceedings of the 8th International Conference Active Media Technology, Macau, 2012. 237--246. Google Scholar

[22] Gharde N D, Thounaojam D M, Soni B. Robust perceptual image hashing using fuzzy color histogram. Multimed Tools Appl, 2018, 77: 30815-30840 CrossRef Google Scholar

[23] Der-Chyuan Lou , Jiang-Lung Liu . Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consumer Electron, 2000, 46: 31-39 CrossRef Google Scholar

[24] Sun Q, Chang S F. A Robust and Secure Media Signature Scheme for JPEG Images. J VLSI Sign Process Syst Sign Image Video Technol, 2005, 41: 305-317 CrossRef Google Scholar

[25] Kee E, Johnson M K, Farid H. Digital Image Authentication From JPEG Headers. IEEE TransInformForensic Secur, 2011, 6: 1066-1075 CrossRef Google Scholar

[26] Iida K, Kiya H. Robust image identification for double-compressed and resized JPEG images. In: Proceedings of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, Honolulu, 2018. 1968--1974. Google Scholar

[27] Yao H, Wei H, Qin C. An improved first quantization matrix estimation for nonaligned double compressed JPEG images. Signal Processing, 2020, 170: 107430 CrossRef Google Scholar

[28] Lei Y, Wang Y, Huang J. Robust image hash in Radon transform domain for authentication. Signal Processing-Image Communication, 2011, 26: 280-288 CrossRef Google Scholar

[29] Tang Z, Ling M, Yao H, et al. Robust image hashing via random Gabor filtering and DWT Comput Materials Continua, 2018, 55: 331--344. Google Scholar

[30] Hu Y C, Lo C C, Chen W L. Probability-based reversible image authentication scheme for image demosaicking. Future Generation Comput Syst, 2016, 62: 92-103 CrossRef Google Scholar

[31] Davarzani R, Mozaffari S, Yaghmaie K. Perceptual image hashing using center-symmetric local binary patterns. Multimed Tools Appl, 2016, 75: 4639-4667 CrossRef Google Scholar

[32] Swaminathan A, Mao Y, Wu M. Image hashing resilient to geometric and filtering operations. In: Proceedings of IEEE 6th Workshop on Multimedia Signal Processing, 2004. 355--358. Google Scholar

[33] Swaminathan A, Mao Y, Wu M. Robust and Secure Image Hashing. IEEE TransInformForensic Secur, 2006, 1: 215-230 CrossRef Google Scholar

[34] Rackoff C, Simon D R. Non-interactive Zero-Knowledge Proof of knowledge and chosen ciphertext attack. In: Proceedings of the 11th Annual International Cryptology Conference, Santa Barbara, 1991. 433--444. Google Scholar

[35] Krawczyk H, Rabin T. Chameleon hashing and signatures. IACR Cryptol ePrint Archive, 1998, 1998: 10. Google Scholar

[36] Chen X, Zhang F, Susilo W. Identity-based chameleon hashing and signatures without key exposure. Inf Sci, 2014, 265: 198-210 CrossRef Google Scholar

[37] Chen X, Zhang F, Kim K. Chameleon hashing without key exposure. In: Proceedings of the 7th International Conference Information Security, Palo Alto, 2004. 87--98. Google Scholar

[38] Ateniese G, de Medeiros B. On the key exposure problem in chameleon hashes. In: Proceedings of the 4th International Conference on Security in Communication Networks, Amalfi, 2004. 165--179. Google Scholar

[39] Bellare M. A note on negligible functions. IACR Cryptology ePrint Archive, 1997, 1997:4. Google Scholar

[40] Pointcheval D, Stern J. Security proofs for signature schemes. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, 1996. 387--398. Google Scholar

[41] Boneh D, Lynn B, Shacham H. Short signatures from the Weil Pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, 2001. 514--532. Google Scholar

[42] Mitsunari S, Sakai R, Kasahara M. A new traitor tracing. IEICE Trans Fundamentals Electron Commun Comput Sci, 2002, 85: 481--484. Google Scholar

[43] Boneh D, Boyen X. Short signatures without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004. 56--73. Google Scholar

[44] You J, Reiter U, Hannuksela M M. Perceptual-based quality assessment for audio-visual services: A survey. Signal Processing-Image Communication, 2010, 25: 482-501 CrossRef Google Scholar

[45] Zhai G, Min X. Perceptual image quality assessment: a survey. Sci China Inf Sci, 2020, 63: 211301 CrossRef Google Scholar

[46] Nguyen L. Accumulators from bilinear pairings and applications. In: Proceedings of Cryptographers' Track at the RSA Conference, San Francisco, 2005. 275--292. Google Scholar

[47] Baric N, Pfitzmann B. Collision-free accumulators and fail-stop signature schemes without trees. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, 1997. 480--494. Google Scholar

[48] Guo F, Susilo W, Mu Y. Introduction to Security Reduction. Berlin: Springer, 2018. Google Scholar