An efficient image authentication method based on Hamming code

Image authentication has come through a history of several years. However, up to the present time, most mainstream image authentication schemes are still unable to detect burst bit errors. Moreover, the capability of recovering tampered pixels in detail (complex) areas has not been very satisfactory either. In this paper, we offer to combine the Hamming code technique, Torus automorphism and bit rotation technique to do tamper proofing. According to our experimental results, our new hybrid method can effectively eliminate burst bit errors, and our recovered pixels in detail areas can actually gain very high clarity. The results show that our scheme is quite a practical method, which is quite able to detect and recover tampered areas.

[1]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[2]  Frank Y. Shih,et al.  An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..

[3]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[4]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[5]  Chin-Chen Chang,et al.  Using set partitioning in hierarchical trees to authenticate digital images , 2003, Signal Process. Image Commun..

[6]  Frank Y. Shih,et al.  Combinational image watermarking in the spatial and frequency domains , 2003, Pattern Recognit..

[7]  Ioannis Pitas,et al.  Chaotic Mixing of Digital Images and Applications to Watermarking , 1996 .

[8]  Chin-Chen Chang,et al.  Digital watermarking of images using neural networks , 2000, J. Electronic Imaging.

[9]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[10]  Il-Seok Oh,et al.  Watermarking text document images using edge direction histograms , 2004, Pattern Recognit. Lett..

[11]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[12]  Jean Serra,et al.  Image Analysis and Mathematical Morphology , 1983 .

[13]  Chin-Chen Chang,et al.  A color image watermarking scheme based on color quantization , 2004, Signal Process..

[14]  Chin-Chen Chang,et al.  A Watermarking Scheme Based on Principal Component Analysis Technique , 2003, Informatica.

[15]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..