Digital Image Protection using Keyed Hash Function

نویسندگان

  • Siva Charan Muraharirao
  • Manik Lal Das
چکیده

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes. DOI: 10.4018/ijcvip.2012040103 International Journal of Computer Vision and Image Processing, 2(2), 36-47, April-June 2012 37 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. way without expecting any punishments; and on the other hand, it is because of poor content protection and detection mechanism by the content owner. In other words, preventing bad persons from fabricating content and detecting both fabricated data and creator are challenging tasks in securing multimedia data. In order to protect multimedia data, some techniques such as digital watermarking, scrambling, authentication, integrity or a combination of these play an important role. This paper focuses one of the techniques, namely digital watermarking with cryptographic primitives. Digital watermarking (Darko & Borko, 2005). is a technique that inserts a piece of information into a target image, which can be later extracted for a variety of purposes and/or detected in case of malpractices. A watermark can be a binary string, a logo, or some intended features of the multimedia content. Whatever maybe the watermark content, the watermarking technique needs to be designed in such a way that an unauthorized entity should not be able to identify any information about the watermarked content and position of it. Whereas, the content owner or authorized entity should be able to identify the watermarked information from the image as and when needed. Watermarking techniques (Darko & Borko, 2005; Mandhani, 2003; Hwang, Chang, & Hwang, 1999) can be broadly classified in two categories: visible watermarking and invisible watermarking. Visible watermarking is the classical way of watermark generation, extraction and deletion, where the watermark is inserted into a cover object. Although visible watermarking is useful for identification purpose, it is not secure watermarking for applications such as image authentication, image alteration and copy protection. In contrast, invisible watermarking is the modern approach for digital image authentication and piracy detection. A typical process flow of embedding and extraction of digital watermark in an image is shown in Figure 1. This paper aims to provide a secure scheme for digital image authentication using invisible watermarking technique. Many techniques (Walton, 1995; Mandhani, 2003; Tang, Hwang, & Yang, 2002; Hwang, Chang, & Hwang, 1999; Yeung & Mintzer, 1997; Wong & Memon, 2001) Chang, Hu, and Lu (2006) and Ahmed, Siyal, and Abbas (2010) have been proposed for protecting multimedia data, detecting content piracy and retaining copyright or ownership, where the protection features include data authentication, data integrity, data hiding, and so on. Least Significant Bit (LSB) and parity bit checking have been used in several products as a light-weight image protection mechanism (Walton, 1995; Mandhani, 2003). LSB technique makes watermark perceptually invisible and the quality of the image is preserved. The working principle of LSB technique is briefly explained as follows. For embedding process, every pixel in a gray-scale image is represented by a byte, or 8 bits. Each bit from the Figure 1. Embedding and extraction of watermark 10 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/digital-image-protection-usingkeyed/72314?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keyed Side-Channel Based Hashing for IP Protection using Wavelets

The protection of intelligent property (IP) is a challenging task, especially in secured embedded systems where program code that is supposed to be a plagiarism cannot be simply read-out for further inspection. This is even more aggravated if the original source code was modified to prevent comparisons of any kind. For instance, watermarks that are actually hidden in the code are at risk to be ...

متن کامل

Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations

Security of information transmitted through the Internet is an international concern. This security is guaranteed by tools like hash functions. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital media must be investigated. In this document an original keyed hash function is evaluated. It is based on chaotic iterations and th...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

A replay-attack resistant message authentication scheme using time-based keying hash functions and unique message identifiers

Hash-based message authentication codes are an extremely simple yet hugely effective construction for producing keyed message digests using shared secrets. HMACs have seen widespread use as ad-hoc digital signatures in many Internet applications. While messages signed with an HMAC are secure against sender impersonation and tampering in transit, if used alone they are susceptible to replay atta...

متن کامل

Hybrid DWT-DCT-Hash function based Digital Image Watermarking for Copyright Protection and Content Authentication of DubaiSat-2 Images

This paper presents a new technique for copyright protection and content authentication of satellite images. The novelty in the presented approach consists in designing a hybrid Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and hash function based digital image watermarking. In this study, two watermarks are embedded in the cover image called robust copyright watermark and f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCVIP

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2012