A Novel Probabilistic Image Authentication Methodbased on Universal Hash Function for Rgb Images

In this paper, a novel hash based image authentication for RGB (Red, Green, Blue) images is proposed. Firstly, universal hash function is modified according to R, G and B layers and 3 different function is obtained to watermarking generation then, watermark generation is performed by using these equations. In this method, one layer is used for watermark embedding. Modulo based data hiding method is used for watermark embedding. To provide confidentiality of the proposed method, chaotic random number generator that is logistic map is used. The embedding layer and watermark generation function are selected by using logistic map. In watermark extraction, modulo operator is used. Watermark generation step is repeated for tamper detection. The extracted watermark and generated watermark are compared with each other. If these watermarks are equal, image is authenticated, otherwise tamper detection is detected. In the proposed method, DWT (Discrete Wavelet Transform) and SVD (Singular Value Decomposition) are used for generating perceptual hash of images and recovering images. Experimental result showed that the proposed method achieved high image authentication ability with minimum distortion.

[1]  Suk Hwan Lee,et al.  DWT based coding DNA watermarking for DNA copyright protection , 2014, Inf. Sci..

[2]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[3]  Lin Teng,et al.  Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme , 2013 .

[4]  D. Vaishnavi,et al.  Robust and Invisible Image Watermarking in RGB Color Space Using SVD , 2015 .

[5]  Jiying Zhao,et al.  A new video watermarking algorithm based on 1D DFT and Radon transform , 2010, Signal Process..

[6]  Teddy Furon,et al.  A Survey of Watermarking Security , 2005, IWDW.

[7]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[8]  Indranil Sengupta,et al.  An adaptive audio watermarking based on the singular value decomposition in the wavelet domain , 2010, Digit. Signal Process..

[9]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[10]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[11]  Hazem Al-Otum,et al.  Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..

[12]  Brian Chen Digital watermarking, information embedding, and data hiding systems , 2000 .

[13]  Chi-Shiang Chan,et al.  Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.

[14]  Cheng-Hsing Yang,et al.  Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding , 2010, J. Vis. Commun. Image Represent..

[15]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[16]  Yih-Kai Lin,et al.  A data hiding scheme based upon DCT coefficient modification , 2014, Comput. Stand. Interfaces.

[17]  Jordan Shropshire,et al.  Personality, attitudes, and intentions: Predicting initial adoption of information security behavior , 2015, Comput. Secur..

[18]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[19]  Marco Botta,et al.  A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection , 2015 .

[20]  Xiaoxiao Ma,et al.  Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy , 2015, J. Vis. Commun. Image Represent..

[21]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[22]  Wen-Chuan Wu,et al.  SVD-based self-embedding image authentication scheme using quick response code features , 2016, J. Vis. Commun. Image Represent..

[23]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[24]  Mei Yu,et al.  New fragile watermarking method for stereo image authentication with localization and recovery , 2015 .