The design and analysis of spatial data structures
The design and analysis of spatial data structures
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Detecting Digital Forgeries Using Bispectral Analysis
Detecting Digital Forgeries Using Bispectral Analysis
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Physics-motivated features for distinguishing photographic images and computer graphics
Proceedings of the 13th annual ACM international conference on Multimedia
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Statistical tools for digital forensics
IH'04 Proceedings of the 6th international conference on Information Hiding
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
A secure and robust digital signature scheme for JPEG2000 image authentication
IEEE Transactions on Multimedia
Computing on authenticated data for adjustable predicates
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
We describe two homomorphic signature schemes for digital photographs such that an intermediate party in possession of a signed photograph can construct a scaled, cropped, and lossily compressed version of the photograph along with a new, valid signature, without knowing the private signing key. In other words, our signature schemes are simultaneously homomorphic with respect to cropping, scaling, and JPEG-like compression. Unlike prior ad-hoc schemes for photographic signatures, our first scheme is provably secure and quite practical. For example, a scaling-homomorphic signature scheme using our techniques requires less than 100KB of signature data for typical digital photographs. Our second signature scheme has weaker security but reduces typical signature sizes to 15KB. Both schemes extend naturally to authenticate movies and other digital media and use novel, multi-dimensional variations of Merkle hashing and GGM trees related to constructions used in computational geometry that may be of independent interest.