Reversible data hiding for tampering detection in remote sensing images using histogram shifting

This paper presents a reversible fragile data hiding scheme for tampering detection in remote sensing images based on the histogram shifting approach. The image to be protected is divided into blocks of a reduced size and a subset of the image bands are selected for embedding. Instead of using the histogram of each separate band, the shifting process is applied to the histogram of the maximum component (or infinity norm) of the vectors obtained with the selected bands. The proposed approach is reversible and thus, the original image can be fully recovered once it has been authenticated. The method is designed to detect specific forged blocks (areas) of the protected image and is shown to succeed to detect copy and replace attacks. In addition, the experimental results, presented for the Cuprite AVIRIS image, show that the method yields extremely high transparency, with PSNR larger than 100 dB prior to reversing the scheme and recovering the original image.

[1]  Qian Du,et al.  A joint band prioritization and band-decorrelation approach to band selection for hyperspectral image classification , 1999, IEEE Trans. Geosci. Remote. Sens..

[2]  S. Macenka,et al.  Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) , 1988 .

[3]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[4]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[5]  Zhaohui Wu,et al.  Advanced Data Mining and Applications , 2013, Lecture Notes in Computer Science.

[6]  Antonio J. Plaza,et al.  Dimensionality reduction and classification of hyperspectral image data using sequences of extended morphological transformations , 2005, IEEE Transactions on Geoscience and Remote Sensing.

[7]  Tian Jun,et al.  Reversible Watermarking by Difference Expansion , 2002 .

[8]  Manuel Graña,et al.  A Multiobjective Evolutionary Algorithm for Hyperspectral Image Watermarking , 2008 .

[9]  Christoph Busch,et al.  Integer DCT-based reversible watermarking for images using companding technique , 2004, IS&T/SPIE Electronic Imaging.

[10]  David Megías,et al.  A novel semi-fragile forensic watermarking scheme for remote sensing images , 2011 .

[11]  Lorenzo Bruzzone,et al.  Classification of hyperspectral remote sensing images with support vector machines , 2004, IEEE Transactions on Geoscience and Remote Sensing.

[12]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[13]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[14]  David Megías,et al.  Watermarking scheme for tampering detection in remote sensing images using variable size tiling and DWT , 2010, Optical Engineering + Applications.

[15]  Anthony Tung Shuen Ho,et al.  A semi-fragile pinned sine transform watermarking system for content authentication of satellite images , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..

[16]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[17]  Nicholas H. Younan,et al.  Watermarking of hyperspectral data , 2003, IGARSS 2003. 2003 IEEE International Geoscience and Remote Sensing Symposium. Proceedings (IEEE Cat. No.03CH37477).

[18]  Dezhi Chen,et al.  Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis , 2004, IGARSS 2004. 2004 IEEE International Geoscience and Remote Sensing Symposium.

[19]  Yao Zhao,et al.  A Novel Reversible Watermarking Based on an Integer Transform , 2007, 2007 IEEE International Conference on Image Processing.

[20]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[21]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[22]  Longbing Cao,et al.  Advanced Data Mining and Applications , 2013, Lecture Notes in Computer Science.