Digital Signature Method for Images without Additional Files, Robust to JPEG Compression and Metadata Removal
https://doi.org/10.25205/1818-7900-2024-22-2-33-43
Abstract
The article discusses a method of digitally signing images that does not use metadata or additional files. The object for signature is an array of 8x8 pixel blocks with a discrete cosine transformation applied, which make up a JPEG file. Any known algorithm can be used as a signature algorithm, for example, RSA.
The resulting digital signature is converted from a binary form to an image. The conversion method is based on encoding every few bits of the signature of one of the 64 basic functions of the discrete cosine transform. Next, the basic function is transformed into an image by an inverse discrete cosine transformation. The resulting signature, encoded as an image, is attached to the original image on the right to form a signed image.
The digital signature is resistant to JPEG compression within adjustable limits. The following method is used to achieve compression resistance. Since the values in the blocks can change during compression, quantization is used – reducing the accuracy of the values. It is designed in such a way that when quantizing compressed and uncompressed images, the values in the blocks after quantization are becoming the same, which allows you to verify the validity of the digital signature. Quantization also includes a step of checking the parity of the received value to avoid misinterpretation of values when compression is strong.
The quantization step does not apply to the part of the image containing the digital signature. This is due to the fact that this part consists of the basic functions of the discrete cosine transform, and even with strong compression, the corresponding basic function will still retain a large coefficient and will be unambiguously interpreted.
About the Authors
E. K. MazaishviliRussian Federation
Evgeniy K. Mazaishvili, PhD Student
Saint Petersburg
Е. Yu. Avksentieva
Russian Federation
Elena Yu. Avksentieva, PhD
Saint Petersburg
References
1. Bellare M., Goldwasser S. Lecture Notes on Cryptography, 2008, p. 168
2. PDF (Portable Document Format), version 1.7, ISO 32000-1, 2008. Library of Congress. URL: https://www.loc.gov/preservation/digital/formats/fdd/fdd000277.shtml (accessed: 11.01.2024).
3. Buchanan W. J. DCT (Discrete Cosine Transform). Theoretical and practical aspects of cryptography. URL: https://asecuritysite.com/comms/dct2 (accessed: 24.12.2023).
4. Abdelhamid A. A., Mona F. M., Mursi A., Alsammak A. K. Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal, 2018.
5. Griffin J. The Ultimate Guide to JPEG Including JPEG Compression & Encoding. URL: https://www.thewebmaster.com/jpeg-definitive-guide/ (accessed: 10.12.2023)
Review
For citations:
Mazaishvili E.K., Avksentieva Е.Yu. Digital Signature Method for Images without Additional Files, Robust to JPEG Compression and Metadata Removal. Vestnik NSU. Series: Information Technologies. 2024;22(2):33-43. (In Russ.) https://doi.org/10.25205/1818-7900-2024-22-2-33-43