Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts

With the widespread use of identification systems, establishing authenticity with sensors has become an important research issue. Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. With its characteristics of reversibility, the scheme is required to fulfill the goals from two aspects. On the one hand, at the encoder, the secret information needs to be embedded into the original image by some algorithms, such that the output image will resemble the input one as much as possible. On the other hand, at the decoder, both the secret information and the original image must be correctly extracted and recovered, and they should be identical to their embedding counterparts. Under the requirement of reversibility, for evaluating the performance of the data hiding algorithm, the output image quality, named imperceptibility, and the number of bits for embedding, called capacity, are the two key factors to access the effectiveness of the algorithm. Besides, the size of side information for making decoding possible should also be evaluated. Here we consider using the characteristics of original images for developing our method with better performance. In this paper, we propose an algorithm that has the ability to provide more capacity than conventional algorithms, with similar output image quality after embedding, and comparable side information produced. Simulation results demonstrate the applicability and better performance of our algorithm.

[1]  Josep Domingo-Ferrer,et al.  Secure Many-to-One Communications in Wireless Sensor Networks , 2009, Sensors.

[2]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[3]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[6]  Hsiang-Cheh Huang,et al.  Metadata-based image watermarking for copyright protection , 2010, Simul. Model. Pract. Theory.

[7]  Yu-Chih Huang,et al.  Reversible Data Hiding Based on Histogram , 2009, ICIC.

[8]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[9]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[10]  Olivier Déforges,et al.  Subjective and objective quality evaluation of lar coded art images , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[11]  Sung-Jea Ko,et al.  A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System , 2011, IEEE Signal Processing Letters.

[12]  Olivier Déforges,et al.  Interleaved S+P scalable coding with inter-coefficient classification methods , 2008, 2008 16th European Signal Processing Conference.

[13]  Andrzej Bialas,et al.  Intelligent Sensors Security , 2010, Sensors.