Skip to main content

Digital Signature Based Control Integrity for JPEG HDR Images

  • Conference paper
  • First Online:
  • 896 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11679))

Abstract

“A ship is always safe at the shore, but that is not what it is built for.”-Albert Einstein. The same philosophy is applied to picture files saved safety on storage devices. This is, however, not always the case. Sharing and exchanging image data through computer networks affect their security. The issue that arises is how to protect these visual contents from malicious attacks. To alleviate this problem, an image verification feature can be exploited to automatically verify the integrity of these contents. In this way, users can detect any intentional corruptions, which can occur at any time during transmission.

In the present work, we propose a selective authentication system adapted to HDR images. The main contribution consists in verifying the integrity of several parts from JPEG-HDR files by using a content-based watermarking method. Specifically, a couple of local digital thumbprint and digital signature is calculated based on the SHA-2(256 bits) secure hash algorithm. Then, a verification process is performed by using two different secret keys (private and public RSA keys). Our HDR image verification scheme is applied in the DCT transform domain and maintains backwards compatibility with the legacy JPEG standard. A performance analysis and comparison with related work demonstrate the effectiveness of the proposed approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yan, C.P., Pun, C.M.: Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans. Inf. Forensics Secur. 12(9), 2144–2158 (2017)

    Article  Google Scholar 

  2. Lin, C., Chang, S.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11(2), 153–168 (2001)

    Article  Google Scholar 

  3. Kwon, O.J., Choi, S., Lee, B.: A watermark-based scheme for authenticating JPEG image integrity. IEEE Access 6, 46194–46205 (2018)

    Article  Google Scholar 

  4. Mzougi, S., Ouled Zaid, A.: Privacy protection and integrity verification of HDR images. In: International Conference on Computer Graphics and Digital Image Processing (2017)

    Google Scholar 

  5. Wallace, G.K.: The JPEG still picture compression standard. Multimedia engineering digital equipment corporation Maynard, Massachusetts. IEEE Trans. Consum. Electron. 38, 1022–2027 (1992)

    Article  Google Scholar 

  6. Ward, G., Simmons, M.: JPEG-HDR: A backwards-compatible, high dynamic range extension to JPEG. ACM SIGGRAPH Courses (2006)

    Google Scholar 

  7. FIPS PUB 180–1, NIST: Secure Hash Standard (SHS), April 1995

    Google Scholar 

  8. Rivest, R.L, Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. In: ACM Proceedings of Communications, pp. 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  9. Clarberg, P., Hasselgren, J., Akenine-Möller, T.: High dynamic range texture compression for graphics hardware. ACM Trans. Graph. 25(3), 698–706 (2006)

    Article  Google Scholar 

  10. Yeganeh, H., Wang, Z.: Objective quality assessment of tone-mapped images. IEEE Trans. Image Process. 22(2), 657–667 (2013)

    Article  MathSciNet  Google Scholar 

  11. Mittal, A., Soundararajan, R., Bovik, A.C.: Making a completely blind image quality analyzer. IEEE Signal Process. Lett. 20(3), 209–212 (2013)

    Article  Google Scholar 

  12. Mantiuk, R., Kim, K., Rempel, A., Heidrich, W.: HDR-VDP-2: a calibrated visual metric for visibility and quality predictions in all luminance conditions. ACM Trans. Graph. 30(4) (2001)

    Google Scholar 

  13. Yuan, L., Korshunov, P., Ebrahimi, T.: Privacy-preserving photo sharing based on a secure JPEG. In: IEEE Conference on Computer Communications (2015)

    Google Scholar 

  14. Yuan, L., David McNally, D., Küpçü, A., Ebrahimi, T.: Privacy-preserving photo sharing based on a public key infrastructure. In: SPIE (2015)

    Google Scholar 

  15. Ebrahimi, T., Grosbois, R.: SSecure JPEG 2000 - JPSEC. In: ICASSP Conference Proceedings 2003, pp. 716–719 (2000)

    Google Scholar 

  16. Wonga, P.W., Memon, N.: Secret and public key authentication watermarking schemes that resist vector quantization attack. In: SPIE (2000)

    Google Scholar 

  17. Niimi, M., Masutani, F., Noda, H.: Protection of privacy in JPEG files using reversible information hiding. In: International Symposium on Intelligent Signal Processing and Communications Systems, pp. 441–446, November 2012

    Google Scholar 

  18. Dufaux, F., Ebrahimi, T.: Toward a secure JPEG. In: Proceedings of SPIE (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Meha Hachani or Azza Ouled Zaid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hachani, M., Zaid, A.O. (2019). Digital Signature Based Control Integrity for JPEG HDR Images. In: Vento, M., Percannella, G. (eds) Computer Analysis of Images and Patterns. CAIP 2019. Lecture Notes in Computer Science(), vol 11679. Springer, Cham. https://doi.org/10.1007/978-3-030-29891-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29891-3_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29890-6

  • Online ISBN: 978-3-030-29891-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics