PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations Assa Naveh and Eran Tromer (Tel Aviv University) Presented at the ...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations
Assa Naveh and Eran Tromer (Tel Aviv University)
Presented at the
2016 IEEE Symposium on Security & Privacy
May 23–25, 2016
San Jose, CA
http://www.ieee-security.org/TC/SP2016/
ABSTRACT
Since the invention of the camera, photos have been used to document reality and to supply proof of events. Yet today it is easy to fabricate realistic images depicting events that never happened. Thus, dozens of papers strive to develop methods for authenticating images. While some commercial cameras already attach digital signatures to photographs, the images often undergo subsequent transformations (cropping, rotation, compression, and so forth), which do not detract from their authenticity, but do change the image data and thus invalidate the signature. Existing methods address this by signing derived image properties that are invariant to some set of transformations. However, these are limited in the supported transformations, and often offer weak security guarantees. We present PhotoProof, a novel approach to image authentication based on cryptographic proofs. It can be configured, according to application requirements, to allow any permissible set of (efficiently computable) transformations. Starting with a signed image, our scheme attaches, to each legitimately derived image, a succinct proof of computational integrity attesting that the transformation was permissible. Anyone can verify these proofs, and generate updated proofs when applying further permissible transformations. Moreover, the proofs are zero-knowledge so that, for example, an authenticated cropped image reveals nothing about the cropped-out regions. PhotoProof is based on Proof-Carrying Data (PCD), a cryptographic primitive for secure execution of distributed computations. We describe the new construction, prove its security, and demonstrate a working prototype supporting a variety of permissible transformations.
Video Information
Views
851
Total views since publication
Likes
9
User likes and reactions
Duration
22:09
Video length
Published
Sep 2, 2016
Release date
Quality
hd
Video definition