Encrypt Information In Images Without Distortion 236
Nomikos writes "C|Net reports: Researchers have created a new way to encrypt information in a digital image and extract it later without any distortion or loss of information.
A team of scientists from Xerox and the University of Rochester said that the technique, called reversible data hiding, could be used in situations that require proof that an image has not been altered."
This has been done forever. (Score:4, Funny)
Re:This has been done forever. (Score:5, Interesting)
Re:This has been done forever. (Score:2, Interesting)
That being said, depending on the type of data you scan you may very well be able to retrieve it all. As a simple example, you can scan a page of plain text and get it all back via OCR with good reliability. I would guess that with a high enough quality scanner you could get pixel-level-accurate scans of a high quality printing. That equipment is probably out of most of our budgets though.
Re:This has been done forever. (Score:3, Funny)
porn (Score:5, Funny)
SWEET!
Encryption? (Score:5, Informative)
Re:Encryption? (Score:4, Informative)
This is called digital watermarking.
These watermarks vs. Digimarc watermarks (Score:4, Informative)
This is called digital watermarking.
But unlike Digimarc watermarks, this kind of watermark isn't designed to survive being sent through the analog hole.
Yes, it's steganography. (Score:3, Insightful)
Steganography isn't the point (Score:3, Insightful)
Re:Encryption? (Score:5, Informative)
Type I simply embeds the data into the spectrum of the image and uses modulo addition as necessary to prevent overflow. Unfortunately, this causes "salt-and-pepper artifacts" because this sometimes affects the most significant bits in a pixel's representation.
Type II uses the traditional method of overwriting the least significant bits or high-frequency coefficients in the image (depending on image encoding).
What this paper does is describe a method that employs Type II encoding and saves the overwritten bits by compressing them and inserting into the embedded data stream. Unlike simple Type II encodings such as always using the lowest two bits, this paper varies the number of bits which are used in each byte. This value is determined according to their compressibility and other parameters in the image. By doing this, the paper obtains a more efficient tradeoff between storage and distortion.
The journal article is "Reversible data hiding" in IEEE Internation Conference on Image Processing, 2002, volume 2, pages 157-160 http://ieeexplore.ieee.org/servlet/opac?punumber=
abstact here (Score:2)
Watermarking
We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded information......
Re:Encryption? (Score:2)
Watermarking
We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded information......
(oops, something went wrong with my previous post)
Re:Encryption? (Score:2)
So the camera is a trusted device. It embeds a secret digital key. When I take a picture proving the existence of little green men, the camera stores, in the watermark signal, a signed md5 sum of the reconstructed(*) image. (I'm assuming just one such signal, several signals tell you how the image has been altered, not just if)
Someone now questions whether this ufo pic I have is real: all I have to do is calculate the md5sum of the image, get the public half of my camera's key (printed on the bottom?) and verify that this indeed matches the signed image key.
Kinda neat.
(*) However, I'm curious. The embedded signal needs to contain the bits it replaces AND some payload data. How can this be a lossless embedding? Did these guys go and invent a recursivly applicable lossless compressor? So I suspect it is not lossless, but merely a lot better than other schemes.
Re:Why this is important (Score:2)
This type of watermarking is ideal for that. It doesn't distort the image at all. The lack of "security" isn't a problem because the system assumes that if you aren't paying more, you'll be happy to report the copyrighted works you possess because it'll go to supporting the authors whose work you like.
Re:Encryption? (Score:3, Funny)
I'm not so sure you get the point I'm trying to make... Can you ever have an alg. that runs in less time than it takes to read in the entire input? I'm trying to make a statment about difficult demands placed by the world and what I think of my own abilities to keep going at the real physical limit, but it just doesn't match the expectations of the world.
I'm not saying I'm asymptotically similar to something - I'm just talking in the worst case that I'm bounded. I feel the world wants things done in an unrealistic time (in the worst case) and that I just can't seem to provide that...
Signed Hash (Score:4, Insightful)
Re:Signed Hash (Score:4, Informative)
A signed hash can be separated from an image, while this type of watermarking cannot.
Re:Signed Hash (Score:2, Interesting)
>>>>>
There must be some way to separate it from the image, as the technique is also supposed to be *reversable*
I'm not sure just what they're up to, though, the article isn't very detailed...
Re:Signed Hash (Score:5, Insightful)
Re:Signed Hash (Score:2, Interesting)
Thus, all those pr0n sites that steal pictures from each other, and post them on their own site with nifty looking "pr0n.net" marks would be verifiably altered.
Re:Signed Hash (Score:2, Interesting)
Re:Signed Hash (Score:2, Insightful)
If you resize the image, you get a different hash, but with this, you still get the authentication. And then when you have portions of the image changed you can tell what portions are changed... From what I can tell this is just a special "image hashing" and not Steganography at all.
Of course, I could be completely wrong.
Re:Signed Hash (Score:2)
Re:Signed Hash (Score:2, Redundant)
Re:Signed Hash (Score:1)
The extracted information could be digital signature which could faciliate higher level of authentication like PKI that hash function alone cannot offer. Hash function could be used to verify whether a piece of work has be altered, with high confidency; but it can't authenticate the author of this piece of work.
Re:Signed Hash (Score:2)
Re:Signed Hash (Score:2)
mmmm (Score:1, Funny)
I don't get it... (Score:5, Interesting)
So while the encrypted data is in the image, the picture is still distorted, it's only when you take the data out, then you get the original. What's the point of that??? I mean that was what it was like before, wasn't it?
By the way, adding plain text to the end of a jpeg file doesn't alter the image in any way, no matter how much you add. So you could encrypt the text you want and add it at the end and there you go, lossless data encryption in images :). Do I get a Nobel prize now?
Re:I don't get it... (Score:2, Informative)
Or you could embed a ton of secret messages in a simple server-to-server mirroring operation, and still wind up with a 1:1 mirror - never tipping anyone off that anything but the visible content was transferred.
That way when the bad guys find it they see no distortions, can find no trace that the image was ever altered, and just think you're looking at porn.
Re:I don't get it... (Score:3, Funny)
Encryption: "These are not the droids you are looking for."
Steganography: "What droids? Those aren't droids, those are pictures of Britney Spears." (Perhaps this is a bad analogy.)
Thus, adding text to the end of an image, even encrypted, shows that you have something to hide. For dissidents in China, this means prison, until you reveal your passphrase--and then they'll probably kill you.
Is it really encryption? (Score:5, Informative)
It DOES distort the image!!! (Score:4, Informative)
Don't let Bin Laden read this... (Score:4, Interesting)
Something doesn't sound right (Score:4, Interesting)
Any optimal image format will result in a file only just big enough to store the image and no bigger - and therefore it will not be able to store any additional data without reducing the image quality in some way.
Without any further information available, could it be they are just talking about taking advantage of flaws in some given format such as jpeg ?
Re:Something doesn't sound right (Score:2)
But I responded to your comment for another reason. Nobody has ever written an optimal image format. Besides which, optimal for what? Plain-old human vision? You can remove information from an image in such a way that a human couldn't tell the difference (what most optimizing does). But computer processing can tell the difference in a nano-second. Probably, human-optimized images wouldn't even fool all primates.
"Optimal" (Score:5, Interesting)
Here it is
1) Lock a graduate student in a room with an image and a huge collection of mathematical knowledge about fractals
2) Tell him/her to compress the image by finding and modeling fractal patterns
3) Wait four days...
VOILA! 10000x compression is not unheard of with 1% or less degredation.
Ever image format that we use today is sub-optimal. We don't even have a mathematical formalism to perfectly identify the entropy (i.e. information) encoded within an image (though we can make rough estimates) to determine the maximum compression. Also, consider than even given the techniques we have today, jpeg isn't the best thing out there, though it is the standard. jpeg2000 is better, and there are some even more highly sophisticated and accurate wavelet based approaches. If we can ever get the kind of computing power available to the supercomputers of today we can do even better by modeling our images using more complex basis functions than sinusiods and wavelets.
Just one final note to sum up: finding optimal compression is definitely an NP-hard problem. Who knows what kind of stuff can be thrown in there without affecting much.
Re:"Optimal" (Score:2)
Don't forget the graduate student will forget to include much of the other "storage" used for his copy of the image, causing the real world results to be multiplied by mu.
Re:Something doesn't sound right (Score:2)
Current data-embedding techniques insert additional watermarking information, which inevitably distorts an image. While the distortion is small, it is usually irreversible. The new technique builds on previous methods but modifies the lowest levels of pixel values using data-embedding algorithms. It allows authorized viewers to extract the embedded authentication message while also removing any distortions created by the embedded information, the researchers said.
They came up with the idea of using a digital watermark in an image, but having the "reader" of the image remove the watermark before it is viewed. Of course, they also claim only "authorized" viewers can remove the watermark... "big woop" and "ya right" all at the same time.
Definitely patent-worthy in this climate. (move over single click shopping carts!)
Wow! Stupid Idea! (Score:2, Insightful)
But what do we do next? We corrupt our picture with the signature, tossing it's bits into the picture as noise, and degrading the picure for all the people who open it. Except for the chosen few who have the (proprietary? patented? expensive?) program which chan detect the signiture, read it, and (WOO HOO!) XOR it out of the picture.
This is not an exciting improvement over "gpg -s".
once again all the early posters got it wrong (Score:5, Insightful)
The fact that every poster so far hasn't seen this fact, is a disturbing reminder of what the average poster on slashdot has become.
does anyone have any suggestions as to where to go next?
Re:once again all the early posters got it wrong (Score:2)
Note that the article talks about authentication and watermarking. And the paper was presented under the "Watermarking" [icip2002.com] section in the IEEE conference. Too bad we can't ge the actual text, although from the detail-light article, it looks pretty much useless anyway.
Ho hum.
Re:once again all the early posters got it wrong (Score:4, Interesting)
While your message has been modded to +5, it is, in fact, wrong.
My bullshit detector is on yellow alert (Score:5, Insightful)
Whatever the camera is doing at the scene of the crime could be faked in a lab. Even if each camera has its own PGP/GPG key, the picture is only as reliable as the security of the camera and the key.
What they should do is have the crime scene photographer and his superior digitally sign the images at the crime scene. This would remove the image format from the equation and make the data and the image as secure as the keys of the people involved.
Re:My bullshit detector is on yellow alert (Score:3, Interesting)
Image authentication is provided from the point of capture and thereafter
EPSON IAS-protected images remain standard JPEG images, viewable with all software programs that read JPEG images
Image manipulation can be detected down to the level of a single bit
Verification of image integrity is fast and easy.
IAS images suffer no visible loss of imaqe quality
Compatible with the EPSON PhotoPC 700, 750Z, 800, 850Z, 3000Z, and 3100Z digital cameras
Works with Windows 95, 98, 2000, Me, XP, and Windows NT 4.0 (with Service Pack 3 or higher)
Not a lot of information, but theirs has been out for a LONG time. It has "non-visible" to the human eye detection, so it should have sufficed for any forensic photographer that could use a 3MP image (which I don't think is sufficient for decent crime scene photography, but I am not a CSI).
I personally do not see where a "lossless" type of authentication is useful, even in medical imaging, is one shade off going to make a difference?
ngoy
Re:My bullshit detector is on yellow alert (Score:2, Interesting)
And thanks to our wonderful health care industry, it probably is immaterial anyways since the doctors get paid NOT to refer you to specialists anyways...
ngoy
Re:My bullshit detector is on yellow alert (Score:5, Informative)
from here [vividlight.com]:
"Finally with a nod toward law enforcement the EOS-1Ds is the first digital camera that offers the ability to verify that images are unaltered originals using the Data Verification Kit DVK-E1, consisting of a dedicated IC card and card reader, together with software for Windows 2000/XP. This package is available to verify that EOS-1Ds image files are absolutely unaltered. "
Re:My bullshit detector is on yellow alert (Score:2)
Re:My bullshit detector is on yellow alert (Score:2)
Right. Except what the sig basically says was "this picture was taken with camera ID [blah]." It only means something if you know camera ID blah is the one that took the picture originally, trust its owner not to change things or leave his camera around, trust Canon not to escrow the keys, etc etc etc.
My technique... (Score:2)
Camouflage (Score:3, Interesting)
I've seen this used to keep zip files on free-webservers which do not allow them.
Quote from their website: "you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files"
Re:Camouflage (Score:1)
Re:Camouflage (Score:2)
This [yahoo.com] Yahoo! Briefcase contains JPEG images which look like the logo of the warez site responsible for uploading them. Within the images is a pirate copy of Paint Shop Pro. The only distingushing characteristic is that they are four megabytes apiece
Note that it's not limited to images, either. According to the website, one could conceal things within text files... (!?)
In other news... (Score:5, Funny)
The RIAA and MPAA have sponsored new legislation to make images illegal on the internet in the United States. Images have been known to carry illegal circumvention devices such as DECSS. Thus images in themselves are also potential circumvention devices under the DMCA.
Re:In other news... (Score:3, Funny)
I use lynx.
Sounds great, sort of... (Score:2)
Covert Channels (Score:3, Informative)
Obligatory DMCA Reference (Score:4, Funny)
No fake Brittany or Seven of Nine! (Score:2, Funny)
Pointless? (Score:2, Insightful)
Does anyone know of a good use for this?
Re:Pointless? (Score:2)
1) Photographer's camera embeds watermark into the image.
2) Photographs can be freely distributed to anyone. The watermark distortion is generally small, so the casual user would not notice it.
3) Anyone who is "authorized" (presumably has been given a key of some sort) is able to extract the watermark and view the original image. If the image has been manipulated (resized, airbrushed, etc.), the watermark will be corrupted and the authorized user will become aware of the alteration.
In the article's example, the camera belongs to a crime scene investigator, and the authorized user is someone assocated with the court system.
I'm not really sure why CNet picked up on this paper. I don't think it's particularly groundbreaking, and it's certainly not the only watermarking paper that was discussed at ICIP 2002. Wake me up when someone figures out how to watermark an image in a way that is robust to a wide variety of attacks (resizing, denoising/compression, pixel shifting, etc.), and is still invisible to the eye.
Careful what you wish for (Score:4, Insightful)
If you can "watermark" (not sure if that is technically the right term for what these folks are proposing) something in such a way that it is undetectable to the viewer, then that implies that you can attach a unique ID to any given file -- which is exactly what SDMI attempted to do (and failed, thanks to Prof. Felten's work at Princeton).
But didn't Felten's paper essentially demonstrate that this sort of perfect information hiding was essentially impossible theoretically? If so, then the Xerox/Rochester guys are wrong. If not, then Felten's paper is wrong and it is possible to insert permanent SDMI-style watermarks in files. I sure hope it's the former and not the latter.
Perhaps this new approach only has to do with psychovisual tricks and not psychoacoustic stuff -- in which case I suppose they could both be right. Anyone more knowledgeable about this care to comment?
-Garth M.
Re:Careful what you wish for (Score:1)
Court Evidence Verification? No... (Score:2, Interesting)
Hey, if it was hard to write ... (Score:1)
Honestly, I'm sure "clean encryption" is a good idea, but the phrase just has the oxymoron quality as "software reliability."
Detectable? (Score:2, Interesting)
This is great! (Score:5, Insightful)
So, if I can add some information to an image without any loss of information in the original, then I don't see any reason why I couldn't use this technique repeatedly, ad inifinitum, on the resulting image. Therefore, they have created a way to turn any one of my pr0n jpegs into an unlimited storage device.
This really changes everything we thought we knew about computer science and information theory. What an incredible discovery!
May be I'm a little bit jumpy but... (Score:2)
I know steganography for terrorism is no new news, but used that on p0rns is intolerable!
Information theory? (Score:2)
Obviously a human viewer isn't going to notice if you just tweak the least significant bits of each pixel, but the article seems to claim that the technique is completely lossless.
Some people have said "why not just use a separate digital signature?" I think the advantage of this technique is that you could save the image in any lossless format (e.g. BMP or TIFF) and still retain the watermark.
Re:You can't. (Score:2)
Amazing, nobody here understands the point (Score:3, Insightful)
Lots of people have suggested digitally signing the image. you that would work. But is it simpler? no. now I have to cart around two images, one people can look at in a computer browser and one "signed one" for evidence. I have to make sure I keep one associated with the other at all times. Yes of course I could decode the signed image when I wanted to view it but that's not a general purpose solution. If I make it act and smell like a jpeg or gif then I can easilty treat it as a single file that all existing image viewers can view. Only when I really want the perfect images and the signature do I have to use my special program.
In fairness I will note that any image format, e.g. jpeg, that has the capabilit to associated additional infomation with an image, also would make a sutiable means of taking care of this. Though possibly not in a robust manner since some programs tinker with the text info in jpegs.
Now as for whether the camera should do the embedding or embedding should be done afterwards, it makes more sense to let the camera do the embedding if it can. A simple Jpeg pops out and were done.
Now about information theory not allowing this. that's piffle. proof by construction. First assume that all uncompressed real world images are compressible. compress it how you wish, lossy or losslessly. there is now room informationwise to squeeze in a small watermark.
Re:Amazing, nobody here understands the point (Score:2, Informative)
You don't have to carry around two images when you digitally sign one. You just need the image and it's signature (~160 chars or so), and can make both as public as you want.
Re:Amazing, nobody here understands the point (Score:2)
Some more information I googled (Score:4, Informative)
The abstract of the paper (Reversible Data Hiding) is: "We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known LSB (least significant bit) modification is proposed as the data embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion, and transmitting these compressed descriptions as a part of the embedded payload. A prediction-based conditional entropy coder which utilizes static portions of the host as side-information improves the compression efficiency, and thus the lossless data embedding capacity"
In case anyone is interested.
Misleading title. (Score:4, Insightful)
So while it's not lossy in the final analysis, and the original version can be reclaimed, it does actually distort the image, while the hidden message is contained within.
Re:Misleading title. (Score:2)
So i read this as "it can be lossy if you want it to. "
2 Faults (Score:2)
It claims adding information to an image without distortion, but in reality the story actually tells of distorting the image in a way that, if needed, could later be reversed and removed. But the distortion is there none the less until it is removed, which removes the "signature".
While it claims that any editing of the image would be detectable (because it modifies the encoded watermark), a reversable system solves this problem nicely: Reverse the process and take out the watermark. Edit the image any way you want (change Britney's dalmation to a poodle, for example). Then apply the watermark to the new image. I saw no proof or even claim that, if the watermake is reversable (which is the whole point of having the technology) then it wouldn't be easy to mark false images with the same watermark.
manipulations (Score:3, Funny)
Telstar
But (Score:3, Funny)
Zero Distortion HOWTO (Score:4, Insightful)
Then I sat down, and realized what's going probably on here (the CNet article didn't specify, and I didn't think to track down the original work. Foo on me. So I'm pulling this out of my proverbial ass.)
Perfectly random images are indeed impossible to add data to without creating some form of irreversable distortion. Suppose you had a "remove transformation" mask embedded in the included transform. This mask itself would take information, which would then need to be added to the transform, which would increase the size of the transform, thus necessitating a bigger mask, ad nauseum. So you could never embed the reversal instructions.
However, photographs are not perfectly random. Along the light wavelengths that nature selected for humans to sense, significant patterns exist -- edges, gradients, shapes, and so on. Though precise intensities eventually hit perfect randomness at absolute sensitivity, digital photographs (even without JPEG) quantize imagery into 8 bits per channel -- 24 bits total. So those patterns we see actually create significant regions of reduced entropy -- less information in the image than there is otherwise room for.
And that's the key -- because once there's extra capacity, we can embed both some message and the means to remove that message in the extra space. Then it's just a matter of using one of a thousand ways to share the secret across all the low entropy regions of the image, and you're done.
No, it doesn't violate information theory. Yes, it's mildly cool. No, it's nothing like a public key steganographic system -- there's nothing inherent about the system that prevents unauthorized removal, or even unauthorized addition of the watermark. But it's a useful adjunct -- concievably, it'd be at the heart of a watermarking system that fingerprinted audio and video in low-entropy segments, then removed the fingerprint before it hit the d/a converter.
I'm pretty sure the strategy extends to floating point representations as well, though there's likely much less compressability due to noisy capture circuitry and higher raw entropy in the signal.
Yours Truly,
Dan Kaminsky
DoxPara Research
http://www.doxpara.com
Re:Zero Distortion HOWTO (Score:2)
-lossless compress it, since real life pictures are always compressable.
-Add Data, upto original size of file.
(-Add a hash/sign it)
Anyone else find it ironic... (Score:3, Funny)
Encrypt Images In Information Without Distortion (Score:2, Funny)
How is this different from EXIF or DIG35? (Score:2)
And this is hard because ....? (Score:3, Interesting)
[1] This is possible because all natural images have very little information in the LSBs of every pixel and those should compress well. If the image is truly random down to LSB there's no way any algorithm can embed extra information in those pixels.
This will be probably patented. At least this is a bit more complicated than sideways swinging.
It's being done the hard way (Score:2)
No information needs to be added to an image at all.
The easy way is to create an algorithm that finds information in a random image that matches your message.
Transmit the key to that data by some secure means, send the image in the open, or even just a pointer to it.
Without the key the data cannot be found, and the original image was never changed.
Think about the Library job of Robert Redfords character in the 1975 movie 'Three Days of the Condor'
Re:No loss of information? (Score:1)
Re:No loss of information? (Score:1)
Re:Holy Cow!! This Is Awesome! (Score:5, Interesting)
Sheesh i feel dirty now that i have summed up the whole article because people post before they read it.
Re:Holy Cow!! This Is Awesome! (Score:2, Funny)
Sheesh i feel dirty now that i have summed up the whole article because people post before they read it.
I find it amusing that you say this when your first post [slashdot.org] to this thread was at 10:29, just three minutes after the article was posted. You sure must read fast...
Re:Holy Cow!! This Is Awesome! (Score:2)
Re:Holy Cow!! This Is Awesome! (Score:4, Informative)
Re:Holy Cow!! This Is Awesome! (Score:2)
Yeah, but I think you're right anyway, as that is the only reasonable thing the article could be talking about. None of the applications require steg, but it's very clear that the invention involves altering the image itself in some way. So based on that, can you think of what you would possibly use this for?
Re:Holy Cow!! This Is Awesome! (Score:3, Informative)
Steganography (Score:5, Insightful)
I'm curious about their claims. Do they claim to be able to hide the data in an existing image format without image loss? For formats like GIF, it'd be tough, because compressed data (by design) lacks the redundant bits Information Theory demands before you can start cramming extra bits of data into the same space. They certainly wouldn't be able to guarantee that the image was without quality loss before removing and correcting for the watermark.
So I guess I'm not sure what they're claiming.
Though I think for the applications they are stating, actual hiding of the data isn't the point. You don't care if people know that there is some data hidden in the image, you only care that they can't read it or forge it. It'd be much easier then, because you could make a new file format. Shit, all you'd have to do is take a
Which isn't a bad idea, actually... You could do some of the things they talked about.
For digitizing contracts, both parties would put an md5 sum encrpyted with their private keys in the image of the contract. Anyone (e.g. the Court) can read the md5 sums and verify that a copy of the contract is legitimate.
For verifying forensics photos, the camera they used would have to encrypt all the photos it takes with a private key (the Courts, again?) not known to the police officers who do the work. I think this is unworkable.
The only problem with both of these ideas is that they are only worth as much as you can trust that the private keys have not been compromised. If you're going to be convicting people on the basis of signed police photos, you'd better be damn sure that the police couldn't have possibly discovered the private key hidden in the camera's hardware.
But like I said, this doesn't involve hiding data in a photograph. I'm just wondering what the -purpose- of the steganography was actually supposed to be. Why is it important that the information be -concealed-?
Re:Steganography (Score:2)
When a compressor reduces an image to a JPEG there's a loss of information in the quantization.
Some coefficients will be almost exactly between two quantization levels, so either choice would be equally bad. In those cases you have the freedom of one bit without loss of quality.
Let's say you encode data by grouping coeficients into bundles of 20, and expect to get a single bit of information out of each bundle by xoring all of members together. Odds are that at least one of those coeficients had the freedom to change.
Easy.
No I didn't find the paper listed. I posted this idea on slashdot a long time ago.
Rocky J. Squirrel
Re:Steganography (Score:2)
JPEG would never cut it for forensics photos.
Not that this also isn't a good idea. I'm just saying it doesn't match what the article suggests.
Huh? (Score:1, Insightful)
Re:New? (Score:4, Insightful)
I've had that technique for years. It's called a checksum.
All a checksum does is provide a playground for anyone with a little Linear Algebra background.
Now if you are talking about message digests based on hash function, like SHA or HMAC you are on firmer ground.