Portable Network Graphics Approach to the Authentication of Halftone Images with Henon Map Encryption

ABSTRACT A new method of blind image authentication based on secret sharing and data repair capability via the use of Portable Network Graphics (PNG) is proposed. The method manipulates the properties of alpha plane to embed the authentication signals as well as the data required for repairing. Care must be taken to maintain the transparency property. The image is halftoned and the authentication signals are generated from the halftoned image. Shamir secret sharing technique is used for the creation of data for repairing. The parameters are selected such that as many shares as possible should be generated for good quality reconstruction. The new scheme guarantees, no matter what type of attack, at least some shares must survive it and hence the actual data can be reconstructed. The authentication is done at the block level, but repairing is done at the pixel level. The embedded authentication signals are extracted from the alpha plane and compared with that computed from the received image. If there is a mismatch, then that block is marked as tampered. Then, repairing is done to the tampered blocks by reverse Shamir algorithm. To enhance the security of the grayscale document images, an encryption based on chaos theory is incorporated. Graphical abstract

[1]  Alex ChiChung Kot,et al.  Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier , 2006, IEEE Signal Processing Letters.

[2]  Seifedine Kadry,et al.  An optimized hierarchical encryption technique for tamper recognition , 2019, Multimedia Tools and Applications.

[3]  Jan P. Allebach,et al.  FM screen design using DBS algorithm , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Che-Wei Lee,et al.  A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability , 2012, IEEE Transactions on Image Processing.

[5]  Shaohua Tang,et al.  A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.

[6]  V. Madhu Viswanatham,et al.  A fast approach to encrypt and decrypt of video streams for secure channel transmission , 2018 .

[7]  Si Liu,et al.  Video steganography: A review , 2019, Neurocomputing.

[8]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[9]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[10]  Jan P. Allebach,et al.  Digital halftoning , 2003 .

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Yu Xue,et al.  Multipurpose watermarking for vector map protection and authentication , 2018, Multimedia Tools and Applications.

[13]  Alex ChiChung Kot,et al.  Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.

[14]  M. Prasad,et al.  Chaos Image Encryption using Pixel shuffling , 2011 .

[15]  Irshad Ahmad Ansari,et al.  A multipurpose image watermarking scheme for digital image protection , 2020, Int. J. Syst. Assur. Eng. Manag..

[16]  Feng Wang,et al.  Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format , 2016, IET Image Process..