Loading…

Verifiable image revision from chameleon hashes

In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integr...

Full description

Saved in:
Bibliographic Details
Published in:Cybersecurity (Singapore) 2021-10, Vol.4 (1), p.1-13, Article 34
Main Authors: Xu, Junpeng, Chen, Haixia, Yang, Xu, Wu, Wei, Song, Yongcheng
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43
cites cdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43
container_end_page 13
container_issue 1
container_start_page 1
container_title Cybersecurity (Singapore)
container_volume 4
creator Xu, Junpeng
Chen, Haixia
Yang, Xu
Wu, Wei
Song, Yongcheng
description In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.
doi_str_mv 10.1186/s42400-021-00097-3
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_a84d2725b6494b9e81c84e3a4ca7ccf7</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_a84d2725b6494b9e81c84e3a4ca7ccf7</doaj_id><sourcerecordid>2578267673</sourcerecordid><originalsourceid>FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhhdRsNT-AU8LntdmJ9kke5TiR6HgRb2GSXbSbtl2a9IK_nvTrqgnT_PB-z4zvFl2XbLbstRyGgUIxgoGZcEYq1XBz7IRVMALDkKe_-kvs0mM6yQCVXOhxCibvlFofYu2o7zd4JLyQB9tbPtt7kO_yd0KN9RRGlcYVxSvsguPXaTJdx1nrw_3L7OnYvH8OJ_dLQpXMdgXvAGuKyTmCBorNZMcAK3nUqPQiF41UionAVkpBXlfKVEz62SjbVNawcfZfOA2Pa7NLqTfwqfpsTWnRR-WBsO-dR0Z1KIBBZWVoha2Jl06LYijcKic8yqxbgbWLvTvB4p7s-4PYZveN1ApDVJJxZMKBpULfYyB_M_VkpljzmbI2aSczSlnczTxwRSTeLuk8Iv-x_UF9KR-lw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2578267673</pqid></control><display><type>article</type><title>Verifiable image revision from chameleon hashes</title><source>Springer Nature - SpringerLink Journals - Fully Open Access </source><source>ProQuest - Publicly Available Content Database</source><creator>Xu, Junpeng ; Chen, Haixia ; Yang, Xu ; Wu, Wei ; Song, Yongcheng</creator><creatorcontrib>Xu, Junpeng ; Chen, Haixia ; Yang, Xu ; Wu, Wei ; Song, Yongcheng</creatorcontrib><description>In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.</description><identifier>ISSN: 2523-3246</identifier><identifier>EISSN: 2523-3246</identifier><identifier>DOI: 10.1186/s42400-021-00097-3</identifier><language>eng</language><publisher>Singapore: Springer Singapore</publisher><subject>Applied Cryptography in Computer and Communications ; Authentication ; Chameleon hashes ; Computer Science ; Cryptography ; Digital imaging ; Digital signatures ; Image authentication ; Image manipulation ; Privacy ; Privacy protection ; Security</subject><ispartof>Cybersecurity (Singapore), 2021-10, Vol.4 (1), p.1-13, Article 34</ispartof><rights>The Author(s) 2021</rights><rights>The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</citedby><cites>FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</cites><orcidid>0000-0002-2560-6346</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2578267673?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Xu, Junpeng</creatorcontrib><creatorcontrib>Chen, Haixia</creatorcontrib><creatorcontrib>Yang, Xu</creatorcontrib><creatorcontrib>Wu, Wei</creatorcontrib><creatorcontrib>Song, Yongcheng</creatorcontrib><title>Verifiable image revision from chameleon hashes</title><title>Cybersecurity (Singapore)</title><addtitle>Cybersecur</addtitle><description>In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.</description><subject>Applied Cryptography in Computer and Communications</subject><subject>Authentication</subject><subject>Chameleon hashes</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Digital imaging</subject><subject>Digital signatures</subject><subject>Image authentication</subject><subject>Image manipulation</subject><subject>Privacy</subject><subject>Privacy protection</subject><subject>Security</subject><issn>2523-3246</issn><issn>2523-3246</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNp9kE1LAzEQhhdRsNT-AU8LntdmJ9kke5TiR6HgRb2GSXbSbtl2a9IK_nvTrqgnT_PB-z4zvFl2XbLbstRyGgUIxgoGZcEYq1XBz7IRVMALDkKe_-kvs0mM6yQCVXOhxCibvlFofYu2o7zd4JLyQB9tbPtt7kO_yd0KN9RRGlcYVxSvsguPXaTJdx1nrw_3L7OnYvH8OJ_dLQpXMdgXvAGuKyTmCBorNZMcAK3nUqPQiF41UionAVkpBXlfKVEz62SjbVNawcfZfOA2Pa7NLqTfwqfpsTWnRR-WBsO-dR0Z1KIBBZWVoha2Jl06LYijcKic8yqxbgbWLvTvB4p7s-4PYZveN1ApDVJJxZMKBpULfYyB_M_VkpljzmbI2aSczSlnczTxwRSTeLuk8Iv-x_UF9KR-lw</recordid><startdate>20211002</startdate><enddate>20211002</enddate><creator>Xu, Junpeng</creator><creator>Chen, Haixia</creator><creator>Yang, Xu</creator><creator>Wu, Wei</creator><creator>Song, Yongcheng</creator><general>Springer Singapore</general><general>Springer Nature B.V</general><general>SpringerOpen</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-2560-6346</orcidid></search><sort><creationdate>20211002</creationdate><title>Verifiable image revision from chameleon hashes</title><author>Xu, Junpeng ; Chen, Haixia ; Yang, Xu ; Wu, Wei ; Song, Yongcheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Applied Cryptography in Computer and Communications</topic><topic>Authentication</topic><topic>Chameleon hashes</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Digital imaging</topic><topic>Digital signatures</topic><topic>Image authentication</topic><topic>Image manipulation</topic><topic>Privacy</topic><topic>Privacy protection</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Junpeng</creatorcontrib><creatorcontrib>Chen, Haixia</creatorcontrib><creatorcontrib>Yang, Xu</creatorcontrib><creatorcontrib>Wu, Wei</creatorcontrib><creatorcontrib>Song, Yongcheng</creatorcontrib><collection>SpringerOpen (Open Access)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Cybersecurity (Singapore)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xu, Junpeng</au><au>Chen, Haixia</au><au>Yang, Xu</au><au>Wu, Wei</au><au>Song, Yongcheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Verifiable image revision from chameleon hashes</atitle><jtitle>Cybersecurity (Singapore)</jtitle><stitle>Cybersecur</stitle><date>2021-10-02</date><risdate>2021</risdate><volume>4</volume><issue>1</issue><spage>1</spage><epage>13</epage><pages>1-13</pages><artnum>34</artnum><issn>2523-3246</issn><eissn>2523-3246</eissn><abstract>In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.</abstract><cop>Singapore</cop><pub>Springer Singapore</pub><doi>10.1186/s42400-021-00097-3</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-2560-6346</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2523-3246
ispartof Cybersecurity (Singapore), 2021-10, Vol.4 (1), p.1-13, Article 34
issn 2523-3246
2523-3246
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_a84d2725b6494b9e81c84e3a4ca7ccf7
source Springer Nature - SpringerLink Journals - Fully Open Access ; ProQuest - Publicly Available Content Database
subjects Applied Cryptography in Computer and Communications
Authentication
Chameleon hashes
Computer Science
Cryptography
Digital imaging
Digital signatures
Image authentication
Image manipulation
Privacy
Privacy protection
Security
title Verifiable image revision from chameleon hashes
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T05%3A02%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Verifiable%20image%20revision%20from%20chameleon%20hashes&rft.jtitle=Cybersecurity%20(Singapore)&rft.au=Xu,%20Junpeng&rft.date=2021-10-02&rft.volume=4&rft.issue=1&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.artnum=34&rft.issn=2523-3246&rft.eissn=2523-3246&rft_id=info:doi/10.1186/s42400-021-00097-3&rft_dat=%3Cproquest_doaj_%3E2578267673%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2578267673&rft_id=info:pmid/&rfr_iscdi=true