Back to Search Start Over

Image Integrity Authentication Scheme Based on Fixed Point Theory.

Authors :
Li, Xu
Sun, Xingming
Liu, Quansheng
Source :
IEEE Transactions on Image Processing; Feb2015, Vol. 24 Issue 2, p632-645, 14p
Publication Year :
2015

Abstract

Based on the fixed point theory, this paper proposes a new scheme for image integrity authentication, which is very different from digital signature and fragile watermarking. By the new scheme, the sender transforms an original image into a fixed point image (very close to the original one) of a well-chosen transform and sends the fixed point image (instead of the original one) to the receiver; using the same transform, the receiver checks the integrity of the received image by testing whether it is a fixed point image and locates the tampered areas if the image has been modified during the transmission. A realization of the new scheme is based on Gaussian convolution and deconvolution (GCD) transform, for which an existence theorem of fixed points is proved. The semifragility is analyzed via commutativity of transforms, and three commutativity theorems are found for the GCD transform. Three iterative algorithms are presented for finding a fixed point image with a few numbers of iterations, and for the whole procedure of image integrity authentication; a fragile authentication system and a semifragile one are separately built. Experiments show that both the systems have good performance in transparence, fragility, security, and tampering localization. In particular, the semifragile system can perfectly resist the rotation by a multiple of 90° flipping and brightness attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
10577149
Volume :
24
Issue :
2
Database :
Complementary Index
Journal :
IEEE Transactions on Image Processing
Publication Type :
Academic Journal
Accession number :
100382215
Full Text :
https://doi.org/10.1109/TIP.2014.2372473