Digital Image Protection using Keyed Hash Function

Digital Image Protection using Keyed Hash Function

Siva Charan Muraharirao, Manik Lal Das
Copyright: © 2012 |Pages: 12
DOI: 10.4018/ijcvip.2012040103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.
Article Preview
Top

1. Introduction

Recent advances of digital technologies make alteration of multimedia data simpler and undetectable by human audible-visual system (Darko & Borko, 2005). One of the primary reasons could be digital contents are easily accessible via Internet and can be replicated and redistributed by illegal means. Use of digital content with proper acknowledgement for academic purpose or non-profit business is a common practice. But, forging data, usage of someone data without due citation, tampering data and blackmailing someone credential, making money from stolen data, etc are major concerns in multimedia security. When a bad person is getting away by doing these practices without being caught then there are two important issues arise - on one hand, the bad person knows that s/he can enjoy her/his life in this way without expecting any punishments; and on the other hand, it is because of poor content protection and detection mechanism by the content owner. In other words, preventing bad persons from fabricating content and detecting both fabricated data and creator are challenging tasks in securing multimedia data. In order to protect multimedia data, some techniques such as digital watermarking, scrambling, authentication, integrity or a combination of these play an important role. This paper focuses one of the techniques, namely digital watermarking with cryptographic primitives.

Digital watermarking (Darko & Borko, 2005). is a technique that inserts a piece of information into a target image, which can be later extracted for a variety of purposes and/or detected in case of malpractices. A watermark can be a binary string, a logo, or some intended features of the multimedia content. Whatever maybe the watermark content, the watermarking technique needs to be designed in such a way that an unauthorized entity should not be able to identify any information about the watermarked content and position of it. Whereas, the content owner or authorized entity should be able to identify the watermarked information from the image as and when needed.

Watermarking techniques (Darko & Borko, 2005; Mandhani, 2003; Hwang, Chang, & Hwang, 1999) can be broadly classified in two categories: visible watermarking and invisible watermarking. Visible watermarking is the classical way of watermark generation, extraction and deletion, where the watermark is inserted into a cover object. Although visible watermarking is useful for identification purpose, it is not secure watermarking for applications such as image authentication, image alteration and copy protection. In contrast, invisible watermarking is the modern approach for digital image authentication and piracy detection. A typical process flow of embedding and extraction of digital watermark in an image is shown in Figure 1.

Figure 1.

Embedding and extraction of watermark

ijcvip.2012040103.f01

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 2 Issues (2016)
Volume 5: 2 Issues (2015)
Volume 4: 2 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing