Approximate image message authentication codes

نویسندگان

  • Liehua Xie
  • Gonzalo R. Arce
  • R. F. Graveman
چکیده

This paper introduces approximate image message authentication codes (IMACs) for soft image authentication. The proposed approximate IMAC survives small to moderate image compression and it is capable of detecting and locating tampering. Techniques such as block averaging and smoothing, parallel approximate message authentication code (AMAC) computation, and image histogram enhancement are used in the construction of the approximate IMAC. The performance of the approximate IMAC in three image modification scenarios, namely, JPEG compression, deliberate image tampering, and additive Gaussian noise, is studied and compared. Simulation results are presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Image Encryption Authentication Compression System

A two-phase content-based image authentication scheme is constructed based on a combination of hard and soft authentication implementing previous existing generic approximate message authentication codes which is a error-correcting codes with cryptographic message authentication codes and symmetric encryption techniques. The message authentication codes which used for hard authentication. The t...

متن کامل

Introducing Robustness into Message Authentication

Message Authentication Codes are very sensitive to any change of the message they are appended to. If one or more bits of the message change, Message Authentication Codes change about 50\% of their bits, making the message useless. The successful verification of Message Authentication Codes demands equality of all of bits of the received Message Authentication Code and that one recalculated of ...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Watermarks and Text Transformations in Visual Document Authentication

Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based on cryptography and require computers or similar hardware to be produced. They can be trusted only as long as the employed hardware can be trusted. We present a complementary scheme for document authentication in untrust...

متن کامل

Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images

Images are normally protected using standard messages authentication codes to protect them against tampering and forgeries. One problem with this approach is that when such images are transmitted over a noisy medium, even a single bit error might render the image as un-authentic to the receiver. In this paper, a noise tolerant data authentication algorithm is proposed. The proposed algorithm ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Multimedia

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2001