• DocumentCode
    46043
  • Title

    Image Integrity Authentication Scheme Based on Fixed Point Theory

  • Author

    Xu Li ; Xingming Sun ; Quansheng Liu

  • Author_Institution
    Coll. of Inf. Sci. & Eng., Hunan Univ., Changsha, China
  • Volume
    24
  • Issue
    2
  • fYear
    2015
  • fDate
    Feb. 2015
  • Firstpage
    632
  • Lastpage
    645
  • Abstract
    Based on the fixed point theory, this paper proposes a new scheme for image integrity authentication, which is very different from digital signature and fragile watermarking. By the new scheme, the sender transforms an original image into a fixed point image (very close to the original one) of a well-chosen transform and sends the fixed point image (instead of the original one) to the receiver; using the same transform, the receiver checks the integrity of the received image by testing whether it is a fixed point image and locates the tampered areas if the image has been modified during the transmission. A realization of the new scheme is based on Gaussian convolution and deconvolution (GCD) transform, for which an existence theorem of fixed points is proved. The semifragility is analyzed via commutativity of transforms, and three commutativity theorems are found for the GCD transform. Three iterative algorithms are presented for finding a fixed point image with a few numbers of iterations, and for the whole procedure of image integrity authentication; a fragile authentication system and a semifragile one are separately built. Experiments show that both the systems have good performance in transparence, fragility, security, and tampering localization. In particular, the semifragile system can perfectly resist the rotation by a multiple of 90° flipping and brightness attacks.
  • Keywords
    convolution; deconvolution; image coding; iterative methods; transforms; GCD transform; Gaussian convolution and deconvolution transform; brightness attack; commutativity theorems; digital signature; fixed point image; fixed point theory; flipping attack; fragile authentication system; fragile watermarking; image integrity authentication scheme; iterative algorithms; semifragile authentication system; semifragility analysis; Authentication; Convolution; Deconvolution; Digital signatures; Receivers; Transforms; Watermarking; Fixed Point Image; Gaussian Convolution and Deconvolution (GCD); Gaussian convolution and deconvolution (GCD); Integrity Authentication,; Integrity authentication; fixed point image;
  • fLanguage
    English
  • Journal_Title
    Image Processing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1057-7149
  • Type

    jour

  • DOI
    10.1109/TIP.2014.2372473
  • Filename
    6960835