Efficient and secure image authentication with robustness and versatility

  • PDF / 1,054,230 Bytes
  • 18 Pages / 595 x 842 pts (A4) Page_size
  • 68 Downloads / 215 Views

DOWNLOAD

REPORT


. RESEARCH PAPER .

December 2020, Vol. 63 222301:1–222301:18 https://doi.org/10.1007/s11432-020-3007-5

Efficient and secure image authentication with robustness and versatility Haixia CHEN, Xinyi HUANG* , Wei WU & Yi MU Fujian Provincial Key Laboratory of Network Security and Cryptology, Center for Applied Mathematics of Fujian Province, College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China Received 5 June 2020/Revised 1 July 2020/Accepted 2 November 2020/Published online 11 November 2020

Abstract Image authentication is the technology of verifying image origin, integrity and authenticity. A rich stream of research on image authentication has shown various trade-off among four favorable features, namely robustness, security, versatility and efficiency. Image data authentication has the highest level of security but provides no robustness/versatility. Image content authentication from robust hashing keeps robust to limited types of operations, and as a result its versatility is not satisfactory. Existing designs of image content authentication from advanced cryptographic primitives achieve robustness, security and versatility, at the cost of low efficiency. In this paper, we present a new design of image authentication with an improved trade-off among the aforementioned features. Our versatile design is robust to a number of predefined image processing operations. Its security can be reduced to q-strong Diffie-Hellman (q-SDH), a complexity problem used by existing cryptographic algorithms. From the aspect of efficiency, the new design has a constant-size authentication overhead (6 2 kB) and a constant verification time (around 0.05 s). While the time of generating authentication overhead increases linearly with the number of permissible editing operations, it only takes around 0.33 s for 1000 types of permissible operations. We believe the new design will facilitate image applications where trustworthy image editing is required. Keywords

image authentication, image processing, cryptography, bilinear maps

Citation Chen H X, Huang X Y, Wu W, et al. Efficient and secure image authentication with robustness and versatility. Sci China Inf Sci, 2020, 63(12): 222301, https://doi.org/10.1007/s11432-020-3007-5

1

Introduction

After the mechanical and electronic eras, human society has entered a new era of information technology [1]. The rapid development of information technology facilitates image processing with powerful image-editing software such as the Photoshop1). Hence, anyone who holds a small amount of ability in computer application can edit an image at will, which brings challenges to make sure that digital images are processed sincerely. Image authentication is the technology of verifying image origin, integrity and authenticity [2]. It is commonly used in image-relevant applications for tampering detection. A subtle issue in image authentication is to distinguish image-data authentication from image-content authentication. Image data includes the exact values of all image b