Authentication and recovery of an image by sharing and lattice-embedding

Based on sharing and lattice-embedding techniques, we present an authentication-recovery method for an image. The recovery data are shared among many shadows, then lattice-embedding is utilized to embed each shadow in the discrete cosine transform domain of an 8×8 block. The proposed method can resist certain content-preserving operations such as JPEG compression, Gaussian noise, and brightness adjustment, up to a tolerance level controlled by a quantization parameter value. The method can also resist certain security attacks such as a cut-and-paste attack, a collage attack, and a vector quantization attack. Compared with previous works, the proposed method has following major advantages and novelty: (1) the method does not require prediction of the tampering trace, and the tampered blocks are always recovered as long as the number of valid blocks reaches a threshold and (2) lattice-embedding yields smaller distortion than does parity-check quantization, and the latter was often used in reported works.

[1]  F. Preparata Holographic dispersal and recovery of information , 1989, IEEE Trans. Inf. Theory.

[2]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[3]  V. Fotopoulos,et al.  Self-authentication of natural color images in Pascal Transform domain , 2009, 2009 16th International Conference on Digital Signal Processing.

[4]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[5]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[6]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[7]  I. S. Hsu,et al.  Simplified procedure for correcting both errors and erasures of Reed-Solomon code using Euclidean algorithm , 1987 .

[8]  Chin-Chen Chang,et al.  Using set partitioning in hierarchical trees to authenticate digital images , 2003, Signal Process. Image Commun..

[9]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[10]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[11]  Chang-Tsun Li,et al.  Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[12]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[13]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[14]  Quan Liu,et al.  Semi-fragile watermarking algorithm for image tampers localization and recovery , 2008 .

[15]  Ja-Chen Lin,et al.  Authentication and cross-recovery for multiple images , 2008, J. Electronic Imaging.

[16]  Xinpeng Zhang,et al.  Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.

[17]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[18]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[19]  Min-Jen Tsai,et al.  A wavelet-based semi-fragile watermarking with recovery mechanism , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[20]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[21]  Chin-Chen Chang,et al.  An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..

[22]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[23]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[24]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[25]  Shang-Lin Hsieh,et al.  A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter , 2008, ATC.

[26]  Min-Jen Tsai,et al.  Authentication and recovery for wavelet-based semifragile watermarking , 2008 .