Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels

In this paper, a content-based image verification scheme is presented. This scheme is suitable for verifying the integrity of images transmitted over insecure networks. The Discrete Cosine Transform is used to embed a block-based mark for each block in another block according to a specific algorithm. To achieve higher protection, the marked image is then encrypted using 2-D chaotic Baker map before being transmitted over the communication channel. The encrypted marked image is transmitted over a wireless Additive White Gaussian Noise (AWGN) channel without error correction codes. At the receiver side, a decryption process is performed, and the marks embedded in each block are extracted to detect suspicious forgery activities. Simulation results show the suitability of the proposed scheme for applications with sensitive data types such as military and nuclear applications.

[1]  Der-Chyuan Lou,et al.  Digital Signature-Based Image Authentication , 2008 .

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[4]  Long-Wen Chang,et al.  Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments , 2010, 2010 10th International Symposium on Communications and Information Technologies.

[5]  Fathi E. Abd El-Samie,et al.  Performance of the audio signals transmission over wireless networks with the channel interleaving considerations , 2012, EURASIP J. Audio Speech Music. Process..

[6]  M. L. Valarmathi,et al.  A Study on Watermarking Schemes for Image Authentication , 2010 .

[7]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[8]  Chang-Tsun Li,et al.  Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[9]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[10]  Chang-Tsun Li,et al.  One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.

[11]  R. Petrovic,et al.  Digital watermarks for audio integrity verification , 2005, TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services.

[12]  Manpreet Kaur,et al.  A Review of Comparison Techniques of Image Steganography , 2013 .