A secure image authentication algorithm with pixel-level tamper localization

In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any...

Full description

Saved in:
Bibliographic Details
Published in2004 International Conference on Image Processing, 2004. ICIP '04 Vol. 3; pp. 1573 - 1576 Vol. 3
Main Authors Jinhai Wu, Zhu, B.B., Shipeng Li, Fuzong Lin
Format Conference Proceeding
LanguageEnglish
Published Piscataway NJ IEEE 2004
Subjects
Online AccessGet full text
ISBN0780385543
9780780385542
ISSN1522-4880
DOI10.1109/ICIP.2004.1421367

Cover

Abstract In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any changes to a signal. It consists of two mechanisms dedicated to authenticity verification for a signal and localization of tampered pixels, respectively. The scheme is secure yet it maintains the fine tamper localization capability of a pixel-wise scheme. Experimental results show that the proposed scheme has a good accuracy in locating tampered pixels.
AbstractList In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here. The new scheme is designed to detect any changes to a signal. It consists of two mechanisms dedicated to authenticity verification for a signal and localization of tampered pixels, respectively. The scheme is secure yet it maintains the fine tamper localization capability of a pixel-wise scheme. Experimental results show that the proposed scheme has a good accuracy in locating tampered pixels.
Author Fuzong Lin
Zhu, B.B.
Shipeng Li
Jinhai Wu
Author_xml – sequence: 1
  surname: Jinhai Wu
  fullname: Jinhai Wu
  organization: State Key Lab of Intelligent Tech. & Syst., Tsinghua Univ., Beijing, China
– sequence: 2
  givenname: B.B.
  surname: Zhu
  fullname: Zhu, B.B.
– sequence: 3
  surname: Shipeng Li
  fullname: Shipeng Li
– sequence: 4
  surname: Fuzong Lin
  fullname: Fuzong Lin
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17611743$$DView record in Pascal Francis
BookMark eNpFkEtPwzAQhC1RJNrCD0BcfOGYsn7F7rGqoFSqBAc4Vxtn3Rq5SZSkvH49EUXisnvYT7MzM2Gjqq6IsWsBMyFgfrderp9nEkDPhJZC5faMTcA6UM4YrUZsLIyUmXYOLtik694AJAglxmyz4B35Y0s8HnBHHI_9nqo-euxjXXFMu7qN_f7AP4bJm_hJKUv0Ton3eGio5an2mOL3L37JzgOmjq7-9pS9Pty_LB-zzdNqvVxssijB9JlCSS4Ik2tf5ASmLJwNQRkTQqnmpHLjXQmIdvBcGuULhcrMgwGtC5ujVVN2e9JtsBu-hxYrH7tt0w4Z2q-tsLkQVquBuzlxkYj-z6eG1A9I81yD
ContentType Conference Proceeding
Copyright 2006 INIST-CNRS
Copyright_xml – notice: 2006 INIST-CNRS
DBID 6IE
6IH
CBEJK
RIE
RIO
IQODW
DOI 10.1109/ICIP.2004.1421367
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
Pascal-Francis
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EndPage 1576 Vol. 3
ExternalDocumentID 17611743
1421367
Genre orig-research
GroupedDBID 29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
AAVQY
IQODW
ID FETCH-LOGICAL-i205t-3a2e8f1564cb6e05db87ff355ffd39e365c8d0aa7522d53cb3a359f5044b76a73
IEDL.DBID RIE
ISBN 0780385543
9780780385542
ISSN 1522-4880
IngestDate Sun Oct 22 16:06:35 EDT 2023
Tue Aug 26 18:49:18 EDT 2025
IsPeerReviewed false
IsScholarly true
Keywords Safety
Image processing
Localization
Oracle
Modeling
Authentication
Language English
License CC BY 4.0
LinkModel DirectLink
MeetingName 2004 International Conference on Image Processing (ICIP 2004)
MergedId FETCHMERGED-LOGICAL-i205t-3a2e8f1564cb6e05db87ff355ffd39e365c8d0aa7522d53cb3a359f5044b76a73
ParticipantIDs pascalfrancis_primary_17611743
ieee_primary_1421367
PublicationCentury 2000
PublicationDate 20040000
2004
PublicationDateYYYYMMDD 2004-01-01
PublicationDate_xml – year: 2004
  text: 20040000
PublicationDecade 2000
PublicationPlace Piscataway NJ
PublicationPlace_xml – name: Piscataway NJ
PublicationTitle 2004 International Conference on Image Processing, 2004. ICIP '04
PublicationTitleAbbrev ICIP
PublicationYear 2004
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020131
ssj0000454093
Score 1.6353207
Snippet In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised...
SourceID pascalfrancis
ieee
SourceType Index Database
Publisher
StartPage 1573
SubjectTerms Applied sciences
Artificial intelligence
Asia
Authentication
Computer science; control theory; systems
Exact sciences and technology
Gray-scale
Intelligent systems
Pattern recognition. Digital image processing. Computational geometry
Pixel
Signal design
Watermarking
Title A secure image authentication algorithm with pixel-level tamper localization
URI https://ieeexplore.ieee.org/document/1421367
Volume 3
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-AkydUMOIH6cGjG9u6rtvREAkaMRwk4UbatdVFGARGYvzr7dsKqPHgbcuybHt93fu9r99D6MbsIYMDEu3wiAon1Ew5ceorx1guJo3fnIYcupFHz9FwEj5O6bSGbve9MEqpsvhMuXBY5vLlMt1CqKznhwEwjNVR3ahZ1au1j6eUVHKHnsgAeGRKrlTjbIGSli57DHkwGhLLvLM7D2y60_eS3kP_YVy6ja59mh27AkWTfGPkpquBF9-s0KCJRrv3r4pP3t1tIdz08xe1438_8Bi1D_1-eLy3ZCeopvJT1LQAFdvtv2mhpzu8gfi8wtnC_Icwh_L4vLBhP8znr8t1VrwtMER38Sr7UHNnDlVJuOAGnq9xaTlt52cbTQb3L_2hY8cxOFng0cIhPFCxBnKZVETKo1LETGuDV7SWJFEkomksPc6ZEbmkJBWEE5po6oWhYBFn5Aw18mWuzhEmRvCBNEjCFzJMGOcJN8ANpgMymRoPrYNaIJzZqmLcmFm5dFD3xxocrrPIB9fq4u_7LtFRVXADkZMr1CjWW3VtsEQhuqUSfQGiHMEu
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsBUPkX59MBIQhLHcTKiCtRCWzGAxFY5sQ0VbVq1qYT49fgStwXEwJYoiiKfHd9757t3AJfmHzI4INGOiFjqhJorJ8585RjPxaXhzVkosBq514_az-H9C3upwdWqFkYpVSafKRcvy7N8OckWGCq79sMAFcY2YJMZVsGraq1VRKUUk1tXRQaoJFOqpRq6hcu0JO0xnoSxkFrtneV9YA88fS-57rQ6jyVxdO33bOMVTJsUc2M5XbW8-OaH7hrQW46gSj95dxdF6mafv8Qd_zvEHThYV_yRx5Uv24WayvegYSEqsRvAfB-6N2SOEXpFhmOzExGBCfJ5YQN_RIxeJ7Nh8TYmGN8l0-GHGjkjzEsihTAAfUZK32lrPw_g-e72qdV2bEMGZxh4rHCoCFSsUV4mSyPlMZnGXGuDWLSWNFE0YlksPSG4MblkNEupoCzRzAvDlEeC00Oo55NcHQGhxvCBNFjCT2WYcCESYaAb9gfkMjMcrQn7aJzBtNLcGFi7NOH8xxysn_PIR3J1_Pd7F7DVfup1B91O_-EEtqv0G4yjnEK9mC3UmUEWRXpeLqgv_tjEgA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2004+International+Conference+on+Image+Processing%2C+2004.+ICIP+%2704&rft.atitle=A+secure+image+authentication+algorithm+with+pixel-level+tamper+localization&rft.au=Jinhai+Wu&rft.au=Zhu%2C+B.B.&rft.au=Shipeng+Li&rft.au=Fuzong+Lin&rft.date=2004-01-01&rft.pub=IEEE&rft.isbn=9780780385542&rft.issn=1522-4880&rft.volume=3&rft.spage=1573&rft.epage=1576+Vol.+3&rft_id=info:doi/10.1109%2FICIP.2004.1421367&rft.externalDocID=1421367
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1522-4880&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1522-4880&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1522-4880&client=summon