A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.

[1]  Hae Yong Kim,et al.  A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..

[2]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[3]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[4]  Alex ChiChung Kot,et al.  Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier , 2006, IEEE Signal Processing Letters.

[5]  Younho Lee,et al.  A new data hiding scheme for binary image authentication with small image distortion , 2009, Inf. Sci..

[6]  Alex ChiChung Kot,et al.  Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.

[7]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[10]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[11]  Wen-Hsiang Tsai,et al.  Moment-preserving thresholding: a new approach , 1995 .

[12]  Wen-Hsiang Tsai,et al.  Moment-preserving thresolding: A new approach , 1985, Comput. Vis. Graph. Image Process..

[13]  Hyunsoo Yoon,et al.  A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates , 2007, IEICE Trans. Commun..

[14]  Wen-Hsiang Tsai,et al.  A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement , 2003, IEEE Communications Letters.