51. A Novel Cholesky Decomposition-based Scheme for Strict Image Authentication
- Author
-
Belferdi, Wassila, Noui, Lemnouar, Behloul, Ali, Belferdi, Wassila, Département d’Informatique [Batna], and Université Hadj Lakhdar Batna 1
- Subjects
Strict authentication ,Cryptographic hash function ,Public key cryptosystem ,[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] ,Cholesky decomposition - Abstract
International audience; With the increasing image falsification due to the easy access and use of image manipulation tools, image authentication techniques have seen considerable interest in protecting multimedia documents integrity and authenticity, it has been demonstrated to be a very powerful solution for ensuring the security of multimedia documents. The aim of this paper is to present a Cholesky decomposition based scheme for strict image authentication. To ensure the requirement of strict authentication where no changes are tolerated to the host image, the Cholesky decomposition properties are used beside the use of cryptographic hash function and public key cryptosystem. For the purpose of reducing the authentication data size, the diagonal of the Cholesky decomposition matrix is used instead of using the entire matrix. The experimental results demonstrate that our technique is able to identify image tampering despite the minor modifications. In addition, the proposed scheme demonstrates its effectiveness in sensitive information systems. We review an application example in medical information security to ensure both integrity and authenticity. Our scheme can find a niche role in healthcare systems as an instrument for secure sharing and control of medical images.
- Published
- 2016