{"title":"利用图像传感器PUF作为信任根对感知图像哈希进行胎记","authors":"Yuan Cao, Le Zhang, Chip-Hong Chang","doi":"10.1109/AsianHOST.2016.7835573","DOIUrl":null,"url":null,"abstract":"The perceptual image hash has been widely used for integrity check of digital image content. Existing image hashes fail to identify the origin of image acquisition and non-repudiable authentication is contingent on the privacy of secret key. This paper presents a new and more secure image hashing scheme by exploiting the CMOS image sensor physical unclonable function (PUF) as a root of trust to imprint a birthmark into the image hash. The hash vector is generated directly by the CMOS image sensor based on the content-based features extracted from its captured image and the timestamp of the image without the need for a shared secret key for its authentication. Other than the ability to detect malicious tampering of image content from normal benign image processing operations, the use of CMOS image sensor PUF as a random one-way function to map the extracted feature and the timestamp to a hash vector provides a non-repudiable proof of the original image acquisition device and time of offence when the digital image content is to be presented as an evidence of a crime. As the hash vector can only be generated by the image sensor when it is powered on, it is inherently secure against invasive, data remanence and replay attacks, which are common threats to key-based perceptual image hashes. Our preliminary experimental results on 49 content-preserving and 5 wilfully tampered copies of an original image captured by a 64 × 64 image sensor PUF fabricated in 180 nm 3.3 V CMOS technology have demonstrated that the tampered images and their regions of alteration can be successfully detected from the hash vectors.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Using image sensor PUF as root of trust for birthmarking of perceptual image hash\",\"authors\":\"Yuan Cao, Le Zhang, Chip-Hong Chang\",\"doi\":\"10.1109/AsianHOST.2016.7835573\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The perceptual image hash has been widely used for integrity check of digital image content. Existing image hashes fail to identify the origin of image acquisition and non-repudiable authentication is contingent on the privacy of secret key. This paper presents a new and more secure image hashing scheme by exploiting the CMOS image sensor physical unclonable function (PUF) as a root of trust to imprint a birthmark into the image hash. The hash vector is generated directly by the CMOS image sensor based on the content-based features extracted from its captured image and the timestamp of the image without the need for a shared secret key for its authentication. Other than the ability to detect malicious tampering of image content from normal benign image processing operations, the use of CMOS image sensor PUF as a random one-way function to map the extracted feature and the timestamp to a hash vector provides a non-repudiable proof of the original image acquisition device and time of offence when the digital image content is to be presented as an evidence of a crime. As the hash vector can only be generated by the image sensor when it is powered on, it is inherently secure against invasive, data remanence and replay attacks, which are common threats to key-based perceptual image hashes. Our preliminary experimental results on 49 content-preserving and 5 wilfully tampered copies of an original image captured by a 64 × 64 image sensor PUF fabricated in 180 nm 3.3 V CMOS technology have demonstrated that the tampered images and their regions of alteration can be successfully detected from the hash vectors.\",\"PeriodicalId\":394462,\"journal\":{\"name\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsianHOST.2016.7835573\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST.2016.7835573","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
摘要
感知图像哈希被广泛用于数字图像内容的完整性检查。现有的图像哈希不能识别图像采集的来源,不可否认的身份验证依赖于密钥的隐私性。本文提出了一种新的更安全的图像哈希方案,利用CMOS图像传感器物理不可克隆函数(PUF)作为信任根,在图像哈希中嵌入胎记。该哈希向量由CMOS图像传感器根据从其捕获的图像中提取的基于内容的特征和图像的时间戳直接生成,而不需要共享密钥进行身份验证。除了能够从正常的良性图像处理操作中检测图像内容的恶意篡改之外,使用CMOS图像传感器PUF作为随机单向函数将提取的特征和时间戳映射到哈希向量,当数字图像内容作为犯罪证据呈现时,提供了原始图像采集设备和犯罪时间的不可否认的证明。由于哈希向量只能在图像传感器上电时生成,因此它具有固有的安全性,可以抵御入侵,数据残留和重播攻击,这些攻击是基于密钥的感知图像哈希的常见威胁。我们对采用180 nm 3.3 V CMOS技术制作的64 × 64图像传感器PUF捕获的原始图像进行了49次内容保留和5次故意篡改的初步实验结果表明,可以成功地从哈希向量中检测到篡改图像及其改变区域。
Using image sensor PUF as root of trust for birthmarking of perceptual image hash
The perceptual image hash has been widely used for integrity check of digital image content. Existing image hashes fail to identify the origin of image acquisition and non-repudiable authentication is contingent on the privacy of secret key. This paper presents a new and more secure image hashing scheme by exploiting the CMOS image sensor physical unclonable function (PUF) as a root of trust to imprint a birthmark into the image hash. The hash vector is generated directly by the CMOS image sensor based on the content-based features extracted from its captured image and the timestamp of the image without the need for a shared secret key for its authentication. Other than the ability to detect malicious tampering of image content from normal benign image processing operations, the use of CMOS image sensor PUF as a random one-way function to map the extracted feature and the timestamp to a hash vector provides a non-repudiable proof of the original image acquisition device and time of offence when the digital image content is to be presented as an evidence of a crime. As the hash vector can only be generated by the image sensor when it is powered on, it is inherently secure against invasive, data remanence and replay attacks, which are common threats to key-based perceptual image hashes. Our preliminary experimental results on 49 content-preserving and 5 wilfully tampered copies of an original image captured by a 64 × 64 image sensor PUF fabricated in 180 nm 3.3 V CMOS technology have demonstrated that the tampered images and their regions of alteration can be successfully detected from the hash vectors.