Robust Image Authentication Using Two-Phase Tag Generation Algorithm

Authors(1) :-Yuvaraj V

Image authentication techniques have recently gained great consideration due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as an internet. Thus, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. Hard authentication and soft authentication has some advantages and disadvantages. To overcome these drawbacks, this paper proposed hybrid design to protect the authenticity of multimedia images. The Approximate Message Authentication Code (AMAC) combines error-correcting codes with cryptographic techniques. In two phase tag generation algorithm have two tags where first tag is protect the image content by using dc elements of Discrete Cosine Transform (DCT) image and the second tag shows sensitivity of image by using ac elements of Discrete Cosine Transform (DCT) image. The proposed scheme attains better the robustness and fragility.

Authors and Affiliations

Yuvaraj V
Electronic and Communication Engineering, College of Engineering Guindy, Anna University, Chennai, Tamilnadu, India

Approximate Message Authentication Code (AMAC), Discrete Cosine Transform (DCT), Image authentication.

  1. Seyed Amir Hossein Tabatabaei, Obaid Ur-Rehman, Natasa Zivic, and Christoph Ruland, “Secure and Robust Two-Phase Image Authentication” IEEE Trans.Inf. VOL. 17, no. 7, july 2015.
  2. Y Zhao, S. Wang, X. Zhang, and H. Yao, “Robust hashing for image authentication using zernike moments and local features,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 55–63, Jan. 2013
  3. D Tonien, R. Safavi-Naini, P. Nickolas, and Y. Desmedt, “Unconditional secure approximate message authentication,” in Proc. Int. Workshop Coding Cryptology, 2009, vol. 5557, pp. 233–247.
  4. L Xie, G. R. Arce, and R. F. Graveman, “Approximate image message authentication codes,” IEEE Trans. Multimedia, vol. 3, no. 2, , Jun. 2001.
  5. NE-D. Sherif and M. Mansour, “Fragile and semi-fragile image authentication based on image self similarity image processing,” in Proc.Int. Conf. Image Process., 2002, vol. 2, pp. 897–900.
  6. M P. Queluz, “Toward robust, content based techniques for image authentication,” in Proc.Workshop Multimedia Signal Process., 1998, pp.297–302.
  7. C Kailasanathan, R. Safavi-Naini, and P. Ogunbona, “Image authentication surviving acceptable modifications,” in Proc. IEEE-EURASIP, Workshop Nonlinear Signal Image Process., 2001.
  8. I C. Chang, B. W. Hsu, and C. S. Laih, “A DCT quantization based image authentication system for digital forensics,” in Proc.Int. Workshop Systematic Approaches Digit. Forensic Eng., 2005,pp. 223–235.
  9. H T. Chang, C.-C. H., C.-H. Y., and D.-F. S., “Image authentication with tampering localization based on watermark embedding in wavelet domain,” Opt. Eng., vol. 48, no. 5, pp. 1–10, 2009.
  10. G. D. Crescenzo, R. F. Graveman, and G. R. Arce, “Approximate message authentication and biometric entity authentication,” in Proc. Financial Cryptography, 2005, vol. 3570, pp. 240–254.
  11. R. F. Graveman and K. Fu, “Approximate message authentication codes,” in Proc. Annu. Symp. Adv. Telecommun. Inf. Distrib. Res.Program, 1999.

Publication Details

Published in : Volume 1 | Issue 4 | November-December 2018
Date of Publication : 2018-11-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 21-26
Manuscript Number : SHISRRJ18147
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

Yuvaraj V, "Robust Image Authentication Using Two-Phase Tag Generation Algorithm", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 1, Issue 4, pp.21-26, November-December.2018
URL : https://shisrrj.com/SHISRRJ18147

Article Preview