Browse > Article
http://dx.doi.org/10.5762/KAIS.2020.21.11.878

A Study on Image Integrity Verification Based on RSA and Hash Function  

Woo, Chan-Il (Department of Information and Communication Engineering, Seoil University)
Goo, Eun-Hee (Dasan University College, Ajou University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.21, no.11, 2020 , pp. 878-883 More about this Journal
Abstract
Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.
Keywords
Cryptography; Steganography; LSB; RSA; Hash Function;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on image processing, Vol. 6, No. 12, pp. 1673-1687, 1997.   DOI
2 P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: https://dx.doi.org/10.1109/ICIP.1998.723526   DOI
3 R. Halder, S. Sengupta, S. Ghosh, D. Kundu, "A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique," IOSR Journal of Computer Engineering(IOSR-JCE), Vol. 18, Issue 1, Ver. IV, pp. 39-43, 2016.
4 Yoo, Heung-Ryol, Son, Yung-Deug, "Fragile Watermark System using Quantization and DC Coefficients", Journal of IKEEE, Vol. 22, No. 3, pp. 774-779, 2018. DOI: https://doi.org/10.7471/ikeee.2018.22.3.774   DOI
5 P. MeenakshiDevi, M. Venkatesan and K. Duraiswamy, "A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform", Journal of Computer Science, Vol. 5, No. 11, pp. 831-837, 2009. DOI: https://doi.org/10.3844/jcssp.2009.831.837   DOI
6 A.Kannammal, S.Subha Rani, "Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain", International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, pp. 181-189, 2011.
7 S. Dadkhah, A. Abd Manaf and S. Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, pp. 1-8, 2012.
8 Heng Zhang, Chengyou Wang, and Xiao Zhou, "Fragile Watermarking Based on LBP for Blind Tamper Detection in Images", Journal of Information Processing Systems, Vol. 13, No. 2, pp. 385-399, 2017. DOI: https://doi.org/10.3745/JIPS.03.0070   DOI
9 H. S. Kim, Digital Watermarking, p. 546, Green Publishing, pp. 17-19, 2005.
10 P. Rahmati, A. Adler, T. Tran, " Watermarking in E-commerce", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 6, pp. 256-265, 2013 DOI: https://doi.org/10.14569/ijacsa.2013.040634   DOI