Loading…
Verifiable image revision from chameleon hashes
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integr...
Saved in:
Published in: | Cybersecurity (Singapore) 2021-10, Vol.4 (1), p.1-13, Article 34 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43 |
---|---|
cites | cdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43 |
container_end_page | 13 |
container_issue | 1 |
container_start_page | 1 |
container_title | Cybersecurity (Singapore) |
container_volume | 4 |
creator | Xu, Junpeng Chen, Haixia Yang, Xu Wu, Wei Song, Yongcheng |
description | In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable. |
doi_str_mv | 10.1186/s42400-021-00097-3 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_a84d2725b6494b9e81c84e3a4ca7ccf7</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_a84d2725b6494b9e81c84e3a4ca7ccf7</doaj_id><sourcerecordid>2578267673</sourcerecordid><originalsourceid>FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhhdRsNT-AU8LntdmJ9kke5TiR6HgRb2GSXbSbtl2a9IK_nvTrqgnT_PB-z4zvFl2XbLbstRyGgUIxgoGZcEYq1XBz7IRVMALDkKe_-kvs0mM6yQCVXOhxCibvlFofYu2o7zd4JLyQB9tbPtt7kO_yd0KN9RRGlcYVxSvsguPXaTJdx1nrw_3L7OnYvH8OJ_dLQpXMdgXvAGuKyTmCBorNZMcAK3nUqPQiF41UionAVkpBXlfKVEz62SjbVNawcfZfOA2Pa7NLqTfwqfpsTWnRR-WBsO-dR0Z1KIBBZWVoha2Jl06LYijcKic8yqxbgbWLvTvB4p7s-4PYZveN1ApDVJJxZMKBpULfYyB_M_VkpljzmbI2aSczSlnczTxwRSTeLuk8Iv-x_UF9KR-lw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2578267673</pqid></control><display><type>article</type><title>Verifiable image revision from chameleon hashes</title><source>Springer Nature - SpringerLink Journals - Fully Open Access </source><source>ProQuest - Publicly Available Content Database</source><creator>Xu, Junpeng ; Chen, Haixia ; Yang, Xu ; Wu, Wei ; Song, Yongcheng</creator><creatorcontrib>Xu, Junpeng ; Chen, Haixia ; Yang, Xu ; Wu, Wei ; Song, Yongcheng</creatorcontrib><description>In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.</description><identifier>ISSN: 2523-3246</identifier><identifier>EISSN: 2523-3246</identifier><identifier>DOI: 10.1186/s42400-021-00097-3</identifier><language>eng</language><publisher>Singapore: Springer Singapore</publisher><subject>Applied Cryptography in Computer and Communications ; Authentication ; Chameleon hashes ; Computer Science ; Cryptography ; Digital imaging ; Digital signatures ; Image authentication ; Image manipulation ; Privacy ; Privacy protection ; Security</subject><ispartof>Cybersecurity (Singapore), 2021-10, Vol.4 (1), p.1-13, Article 34</ispartof><rights>The Author(s) 2021</rights><rights>The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</citedby><cites>FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</cites><orcidid>0000-0002-2560-6346</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2578267673?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Xu, Junpeng</creatorcontrib><creatorcontrib>Chen, Haixia</creatorcontrib><creatorcontrib>Yang, Xu</creatorcontrib><creatorcontrib>Wu, Wei</creatorcontrib><creatorcontrib>Song, Yongcheng</creatorcontrib><title>Verifiable image revision from chameleon hashes</title><title>Cybersecurity (Singapore)</title><addtitle>Cybersecur</addtitle><description>In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.</description><subject>Applied Cryptography in Computer and Communications</subject><subject>Authentication</subject><subject>Chameleon hashes</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Digital imaging</subject><subject>Digital signatures</subject><subject>Image authentication</subject><subject>Image manipulation</subject><subject>Privacy</subject><subject>Privacy protection</subject><subject>Security</subject><issn>2523-3246</issn><issn>2523-3246</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNp9kE1LAzEQhhdRsNT-AU8LntdmJ9kke5TiR6HgRb2GSXbSbtl2a9IK_nvTrqgnT_PB-z4zvFl2XbLbstRyGgUIxgoGZcEYq1XBz7IRVMALDkKe_-kvs0mM6yQCVXOhxCibvlFofYu2o7zd4JLyQB9tbPtt7kO_yd0KN9RRGlcYVxSvsguPXaTJdx1nrw_3L7OnYvH8OJ_dLQpXMdgXvAGuKyTmCBorNZMcAK3nUqPQiF41UionAVkpBXlfKVEz62SjbVNawcfZfOA2Pa7NLqTfwqfpsTWnRR-WBsO-dR0Z1KIBBZWVoha2Jl06LYijcKic8yqxbgbWLvTvB4p7s-4PYZveN1ApDVJJxZMKBpULfYyB_M_VkpljzmbI2aSczSlnczTxwRSTeLuk8Iv-x_UF9KR-lw</recordid><startdate>20211002</startdate><enddate>20211002</enddate><creator>Xu, Junpeng</creator><creator>Chen, Haixia</creator><creator>Yang, Xu</creator><creator>Wu, Wei</creator><creator>Song, Yongcheng</creator><general>Springer Singapore</general><general>Springer Nature B.V</general><general>SpringerOpen</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-2560-6346</orcidid></search><sort><creationdate>20211002</creationdate><title>Verifiable image revision from chameleon hashes</title><author>Xu, Junpeng ; Chen, Haixia ; Yang, Xu ; Wu, Wei ; Song, Yongcheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Applied Cryptography in Computer and Communications</topic><topic>Authentication</topic><topic>Chameleon hashes</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Digital imaging</topic><topic>Digital signatures</topic><topic>Image authentication</topic><topic>Image manipulation</topic><topic>Privacy</topic><topic>Privacy protection</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Junpeng</creatorcontrib><creatorcontrib>Chen, Haixia</creatorcontrib><creatorcontrib>Yang, Xu</creatorcontrib><creatorcontrib>Wu, Wei</creatorcontrib><creatorcontrib>Song, Yongcheng</creatorcontrib><collection>SpringerOpen (Open Access)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Cybersecurity (Singapore)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Xu, Junpeng</au><au>Chen, Haixia</au><au>Yang, Xu</au><au>Wu, Wei</au><au>Song, Yongcheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Verifiable image revision from chameleon hashes</atitle><jtitle>Cybersecurity (Singapore)</jtitle><stitle>Cybersecur</stitle><date>2021-10-02</date><risdate>2021</risdate><volume>4</volume><issue>1</issue><spage>1</spage><epage>13</epage><pages>1-13</pages><artnum>34</artnum><issn>2523-3246</issn><eissn>2523-3246</eissn><abstract>In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.</abstract><cop>Singapore</cop><pub>Springer Singapore</pub><doi>10.1186/s42400-021-00097-3</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-2560-6346</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2523-3246 |
ispartof | Cybersecurity (Singapore), 2021-10, Vol.4 (1), p.1-13, Article 34 |
issn | 2523-3246 2523-3246 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_a84d2725b6494b9e81c84e3a4ca7ccf7 |
source | Springer Nature - SpringerLink Journals - Fully Open Access ; ProQuest - Publicly Available Content Database |
subjects | Applied Cryptography in Computer and Communications Authentication Chameleon hashes Computer Science Cryptography Digital imaging Digital signatures Image authentication Image manipulation Privacy Privacy protection Security |
title | Verifiable image revision from chameleon hashes |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T05%3A02%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Verifiable%20image%20revision%20from%20chameleon%20hashes&rft.jtitle=Cybersecurity%20(Singapore)&rft.au=Xu,%20Junpeng&rft.date=2021-10-02&rft.volume=4&rft.issue=1&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.artnum=34&rft.issn=2523-3246&rft.eissn=2523-3246&rft_id=info:doi/10.1186/s42400-021-00097-3&rft_dat=%3Cproquest_doaj_%3E2578267673%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c502t-3d2385ae0ce2db6806322abf368a48aaf7d667c62a0164eff57490bc6d8bd1b43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2578267673&rft_id=info:pmid/&rfr_iscdi=true |