An image authentication scheme considering privacy - A first step towards surveillance camera authentication

Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken Ichi Okada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we propose an authentication scheme considering privacy aimed for JPEG images. A picture from a surveillance camera must be authenticated when submitted to a third party, such as a leagal organization, courts and so on. On one hand, privacy of objects in the picture must be considered. Therefore, mosaic and maskig must be performed to the picture if needed. Our scheme authenticate JPEG picture, where parts are processed by mosaic and masking. Our scheme uses Merkle tree and Sandhu tree and acheives small overhead size needed to authenticate the processed picture.

Original languageEnglish
Title of host publicationProceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
Pages253-256
Number of pages4
DOIs
Publication statusPublished - 2005 Dec 1
Event19th International Conference on Advanced Information Networking and Applications, AINA 2005 - Taipei, Taiwan, Province of China
Duration: 2005 Mar 282005 Mar 30

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
Volume2
ISSN (Print)1550-445X

Other

Other19th International Conference on Advanced Information Networking and Applications, AINA 2005
CountryTaiwan, Province of China
CityTaipei
Period05/3/2805/3/30

    Fingerprint

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Kawaguchi, N., Ueda, S., Obata, N., Shigeno, H., & Okada, K. I. (2005). An image authentication scheme considering privacy - A first step towards surveillance camera authentication. In Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005 (pp. 253-256). [1423688] (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; Vol. 2). https://doi.org/10.1109/AINA.2005.105