Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Func
Addition of hash component in a message is always for verification of authentication of message without integrity. In order to retain integrity certain schemes such as Merkle–Damgard scheme or Rabin scheme based on the block cipher can be used. However, t
- PDF / 878,783 Bytes
- 15 Pages / 439.37 x 666.142 pts Page_size
- 51 Downloads / 212 Views
Abstract Addition of hash component in a message is always for verification of authentication of message without integrity. In order to retain integrity certain schemes such as Merkle–Damgard scheme or Rabin scheme based on the block cipher can be used. However, the block cipher schemes in messages do not get applicable on image which are encoding message in a visual format. Therefore, block cipher based schemes are not able to provide tamper localization in case of image authentication. Tamper detection is needed in case of images as it is not visualized without proper verification. Moreover, localization is not possible by hash verification making the authentication processes only detectable but not identifiable. The paper presents a generation process of three least significant bits of hash function. The image insertion is not visualized due to human eye limitation. The method proposed is able to embed a secret image (gray scale) inside a corner image. Experimental results show an improvement in peak signal-to-noise ratio (PSNR) values of the proposed technique over the other techniques available, such as hash-based LSB(2-3-3) image steganography in spatial domain. This paper proposes an image authentication process not only for robustness, security, and tamper detection but also successfully able to identify tamper by a process of tamper localization. The parameters compared include the classical mechanism along with newly introduced entropy measurement of images. A performance analysis is able to show the result claimed in the paper. The paper uses a least significant bit (LSB) based hash function, which is a blind technique as image-related information is never sent to receiver separately. In fact, the proposed U.K. Das (✉) Srikrishna College, Bagula, Nadia, West Bengal, India e-mail: [email protected] S.G. Samaddar ⋅ P.K. Keserwani Department of Computer Science & Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India e-mail: [email protected] P.K. Keserwani e-mail: [email protected] © Springer Nature Singapore Pte. Ltd. 2018 Y.-C. Hu et al. (eds.), Intelligent Communication and Computational Technologies, Lecture Notes in Networks and Systems 19, https://doi.org/10.1007/978-981-10-5523-2_14
141
142
U.K. Das et al.
approach is a clever design as the generated hash function will be embedded in the image itself. The proposed mechanism is able to offer good imperceptibility between original image and embedded image with hash bits. Even a minute tampering can be detected with proper localization; the localization of tampering is having its wide applicability in case of forensic evidence of malicious image morphing.
⋅
Keywords Image authentication Image hashing Least significant bit (LSB) based technique Integrity Tamper detection
⋅
⋅
1 Introduction The data produced by multimedia devices have characteristics that are different from the data due to textual messages or data having character representation of any language. The multimedia devices, such as scanners, digital cam
Data Loading...