DocumentCode :
46043
Title :
Image Integrity Authentication Scheme Based on Fixed Point Theory
Author :
Xu Li ; Xingming Sun ; Quansheng Liu
Author_Institution :
Coll. of Inf. Sci. & Eng., Hunan Univ., Changsha, China
Volume :
24
Issue :
2
fYear :
2015
fDate :
Feb. 2015
Firstpage :
632
Lastpage :
645
Abstract :
Based on the fixed point theory, this paper proposes a new scheme for image integrity authentication, which is very different from digital signature and fragile watermarking. By the new scheme, the sender transforms an original image into a fixed point image (very close to the original one) of a well-chosen transform and sends the fixed point image (instead of the original one) to the receiver; using the same transform, the receiver checks the integrity of the received image by testing whether it is a fixed point image and locates the tampered areas if the image has been modified during the transmission. A realization of the new scheme is based on Gaussian convolution and deconvolution (GCD) transform, for which an existence theorem of fixed points is proved. The semifragility is analyzed via commutativity of transforms, and three commutativity theorems are found for the GCD transform. Three iterative algorithms are presented for finding a fixed point image with a few numbers of iterations, and for the whole procedure of image integrity authentication; a fragile authentication system and a semifragile one are separately built. Experiments show that both the systems have good performance in transparence, fragility, security, and tampering localization. In particular, the semifragile system can perfectly resist the rotation by a multiple of 90° flipping and brightness attacks.
Keywords :
convolution; deconvolution; image coding; iterative methods; transforms; GCD transform; Gaussian convolution and deconvolution transform; brightness attack; commutativity theorems; digital signature; fixed point image; fixed point theory; flipping attack; fragile authentication system; fragile watermarking; image integrity authentication scheme; iterative algorithms; semifragile authentication system; semifragility analysis; Authentication; Convolution; Deconvolution; Digital signatures; Receivers; Transforms; Watermarking; Fixed Point Image; Gaussian Convolution and Deconvolution (GCD); Gaussian convolution and deconvolution (GCD); Integrity Authentication,; Integrity authentication; fixed point image;
fLanguage :
English
Journal_Title :
Image Processing, IEEE Transactions on
Publisher :
ieee
ISSN :
1057-7149
Type :
jour
DOI :
10.1109/TIP.2014.2372473
Filename :
6960835
Link To Document :
بازگشت