Image authentication scheme based on reversible fragile watermarking with two images

Abstract Image authentication receives growing awareness because digital images can be easily modified and the modification is hard to detect. A reversible image authentication method that can improve the accuracy of tamper detection and the quality of watermarking image is presented in this paper. In the proposed method, reversible data hiding is implemented with two identical host images, where the secret information is embedded in one host image while the distortion information is embedded in the other image. In the authentication process, we compared the information extracted from the image with the original authentication information to judge whether the image was tampered with. Experimental results show that the algorithm can improve the accuracy of tamper detection and guarantee the image quality while a large number of authentication information is embedded.

[1]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[3]  D. N. Vizireanu,et al.  Watermarking-based image authentication robust to JPEG compression , 2015 .

[4]  Fei Peng,et al.  Improved PVO-based reversible data hiding , 2014, Digit. Signal Process..

[5]  Manpreet Singh,et al.  Digital signature verification scheme for image authentication , 2015, 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS).

[6]  Musheer Ahmad,et al.  Digital image authentication and encryption using digital signature , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[7]  Xingming Sun,et al.  A robust forgery detection algorithm for object removal by exemplar-based image inpainting , 2017, Multimedia Tools and Applications.

[8]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[9]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[10]  Mohammad Ziaullah,et al.  Image feature based authentication and digital signature for wireless data transmission , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).

[11]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[12]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[13]  Gaobo Yang,et al.  A real-time dual watermarking algorithm of H.264/AVC video stream for Video-on-Demand service , 2012 .

[14]  Chin-Chen Chang,et al.  Second-order steganographic method based on adaptive reference matrix , 2015, IET Image Process..

[15]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[16]  Weiming Zhang,et al.  A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Trans. Inf. Forensics Secur..

[17]  Xiang Wang,et al.  A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition , 2015, Inf. Sci..

[18]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[19]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[20]  Hyoung Joong Kim,et al.  Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding , 2015, Signal Process..

[21]  Chin-Chen Chang,et al.  Reversible data hiding scheme using two steganographic images , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[22]  Jin Tang,et al.  Improved Reversible Image Authentication Scheme , 2016, Cognitive Computation.

[23]  Bin Li,et al.  High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion , 2013, Signal Process..

[24]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[25]  Guillermo Morales-Luna,et al.  Selective image authentication tolerant to JPEG compression , 2015, 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA).

[26]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[27]  Xing Zhang,et al.  Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.