Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Authentication, Tamper Localization and Rectification algorithm with Privacy Preservation of Image for the Cloud Using HMAC


Affiliations
1 Department of Computer Science and Engineering, PDA Engineering College, India
2 Department of Computer Science, Visvesvaraya Technological University, India
     

   Subscribe/Renew Journal


Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many approaches have been proposed to protect the privacy of multimedia images over cloud through cryptography, these cryptographic approaches prevent the visibility of image contents but it does not identify if any changes are made on encrypted data by insider attack and cipher-text only attack. In this paper, we proposed to provide authentication, tamper localization, rectification along with privacy preservation of the image using padding extra bit plane for tamper localization, Hash message authentication code (HMAC) algorithm to authentication image, tamper rectification. The proposed algorithm will provide privacy to the image through hiding bit planes.

Keywords

Image Authentication, Privacy Preservation, Tamper Localization, Cloud, Insider Attack, Sabotage Attack, Hash Message Authentication Code.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Matt Bishop, et al., “Insider Threat Identification by Process Analysis”, IEEE Security and Privacy Workshops, pp. 251-264, 2014.
  • Seyed Mohammad Mousavi, “Image Authentication Scheme using Digital Signature and Digital Watermarking”, International Journal of Computational Engineering and Management, Vol. 16, No. 3, pp. 59-63, 2013.
  • M.S. Wang and W.C. Chen, “A Majority-Voting Based Watermarking Scheme for Colour Image Tamper Detection and Recovery”, Computer Standards and Interfaces, Vol. 29, No. 5, pp. 561-570, 2007.
  • J.J. Eggers and B. Girod, “Blind Watermarking Applied to Image Authentication”, Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1977-1980, 2001.
  • E.T. Lin, C.I. Podilchuk and E.J. Delp, “Detection of Image Alterations using Semi-Fragile Watermarks”, Proceedings of International Society for Optics and Photonics in Electronic Imaging, pp. 152-163, 2000.
  • D. Kundur and D. Hatzinakos, “Digital Watermarking for Telltale Tamper Proofing and Authentication”, Proceedings of the IEEE, Vol. 87, No. 7, pp. 1167-1180, 1999.
  • S. J. Jereesha Mary, C. Seldev Christopher and S. Sebastin Antony Joe, “Novel Scheme for Compressed Image Authentication using LSB Watermarking and EMRC6 Encryption”, Circuits and Systems, Vol. 7, pp. 1722-1733, 2016.
  • P. Meenakshi Devi, “Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform”, International Journal of Computer Science and Information Security, Vol. 6, No. 2, pp. 67-74, 2009.
  • D.E. Popescu and A.M. Lonea, “An Hybrid Text-Image Based Authentication for Cloud Services”, International Journal of Computer Communication, Vol. 8, No. 2, pp. 263-274, 2013.
  • Suraj Kumar Singh, Varun P. Gopi and P. Palanisamy, “Image Security using DES and RNS with Reversible Watermarking”, Proceedings of IEEE International Conference on Electronics and Communication, pp. 354-368, 2014.
  • Sajjad Dadkhah , Azizah Abd Manaf and Somayeh Sadeghi, “Efficient Digital Image Authentication and Tamper Localization Technique using 3LSB Watermarking”, International Journal of Computer Science Issues, Vol. 9, No. 2, pp. 1-8, 2012.
  • Eric Kee, Micah K. Johnson and Hany Farid, “Digital Image Authentication from JPEG Headers”, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 1066-1075, 2011.
  • Ching-Yung Lin and Shih-Fu Chang, “A Robust Image Authentication method Distinguishing JPEG Compression from Malicious Manipulation”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, No. 2, pp. 153-168, 2001
  • William R. Claycomb, Carly L. Huth, Lori Flynn, David M. McIntire and Todd B. Lewellen, “Chronological Examination of Insider Threat Sabotage: Preliminary Observations”, Software Engineering Institute, pp. 1-15, 2012.
  • Miltiadis Kandias, Nikos Virvilis and Dimitris Gritzalis, “The Insider Threat in Cloud Computing”, Proceeding of 6th International Workshop, pp. 93-103, 2011
  • William R. Claycomb and Alex Nicoll, “Insider Threats to Cloud Computing: Directions for New Research Challenges”, Proceedings of IEEE 36th Annual Computer Software and Applications Conference, pp. 154-159, 2012
  • Adrian Duncan, Sadie Creese and Michael Goldsmith, “An Overview of Insider Attacks in Cloud Computing”, Concurrency and Computational Practice and Experience, Vol. 27, No. 12, pp. 2964-2981, 2014.
  • Mihir Bellare, Ran Canetti and Hugo Krawczyk, “Keying Hash Functions for Message Authentication”, Proceedings of Annual International Cryptology Conference, pp. 1-15, 1996.
  • T. Venkata Sainath Gupta, C. Naveen, V.R. Satpute and A.S. Gandhi, “Image Security using Chaos and EZW Compression”, Proceedings of IEEE Students Conference on Engineering and Systems, pp. 115-119, 2014.
  • Atef Masmoudi and William Puech, “Lossless Chaos-based Crypto-Compression Scheme for Image Protection”, IET Image Processing, Vol. 8, No. 12, pp. 671-686, 2014.
  • Wan-Li Lyu, Chin-Chen Chang and Feng Wang, “Image Authentication and Self-Recovery Scheme based on the Rehashing Model”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 3, pp. 460-474, 2016.
  • Hong Zhong, Haiquan Liu, Chin-Chen Chang, “A Novel Fragile Watermark-based Image Authentication Scheme for AMBTC-compressed Images”, Journal of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 2, pp. 362-375, 2016.
  • Mihir Bellare, Ran Canetti and Hugo Krawczyk, “Keying Hash Functions for Message Authentication”, Proceedings of Advances in Cryptology, pp. 1-19, 1996.
  • Bo Zhao, Guihe Qin and Pingping Liu, “A Robust Image Tampering Detection Method based on Maximum Entropy Criteria”, Entropy, Vol. 17, No. 12, pp. 7948-7966, 2015.

Abstract Views: 369

PDF Views: 5




  • Authentication, Tamper Localization and Rectification algorithm with Privacy Preservation of Image for the Cloud Using HMAC

Abstract Views: 369  |  PDF Views: 5

Authors

Sayyada Fahmeeda Sultana
Department of Computer Science and Engineering, PDA Engineering College, India
D. C. Shubhangi
Department of Computer Science, Visvesvaraya Technological University, India

Abstract


Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many approaches have been proposed to protect the privacy of multimedia images over cloud through cryptography, these cryptographic approaches prevent the visibility of image contents but it does not identify if any changes are made on encrypted data by insider attack and cipher-text only attack. In this paper, we proposed to provide authentication, tamper localization, rectification along with privacy preservation of the image using padding extra bit plane for tamper localization, Hash message authentication code (HMAC) algorithm to authentication image, tamper rectification. The proposed algorithm will provide privacy to the image through hiding bit planes.

Keywords


Image Authentication, Privacy Preservation, Tamper Localization, Cloud, Insider Attack, Sabotage Attack, Hash Message Authentication Code.

References