Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format

Recently, Lee and Tsai proposed a new authentication method for greyscale document images using the portable network graphics format image; however, their method cannot resist the self-substitution attack, the same-position-substitution attack, or the cut-off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. Therefore, the authors proposed a security-enhanced authentication scheme based on Lee and Tsai's method. The authors’ proposed scheme uses three random binary sequences to randomise the binary version of a given greyscale document image, and thus overcomes the security flaws mentioned above. The authors’ proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above. Moreover, the authors’ proposed scheme retains all of the strengths of Lee and Tsai's scheme. The authors improve the opacity of the alpha channel of stego-image by using Wang and Su's extended secret sharing, and enhance the data security by using Hash functions. The experimental results show that the authors’ proposed scheme is effective for application.

[1]  Alex ChiChung Kot,et al.  Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.

[2]  Wen-Hsiang Tsai,et al.  Moment-preserving thresolding: A new approach , 1985, Comput. Vis. Graph. Image Process..

[3]  Ki-Hyun Jung,et al.  Data hiding method in binary images based on block masking for key authentication , 2014, Inf. Sci..

[4]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[5]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[6]  Che-Wei Lee,et al.  A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability , 2012, IEEE Transactions on Image Processing.

[7]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[8]  Younho Lee,et al.  A new data hiding scheme for binary image authentication with small image distortion , 2009, Inf. Sci..

[9]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[10]  Bernd Girod,et al.  Image Authentication Using Distributed Source Coding , 2012, IEEE Transactions on Image Processing.

[11]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.