A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

[1]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[2]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[3]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[4]  Chin-Chen Chang,et al.  Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity , 2014, Int. J. Netw. Secur..

[5]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[6]  Di Wu,et al.  A novel image hash algorithm resistant to print-scan , 2009, Signal Process..

[7]  Wu-Lin Chen,et al.  A novel tamper detection scheme for BTC-compressed images , 2013 .

[8]  Chin-Chen Chang,et al.  Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..

[9]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Jiashu Zhang,et al.  Adjacent-block based statistical detection method for self-embedding watermarking techniques , 2009, Signal Process..

[11]  Yu-Chen Hu,et al.  An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..

[12]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[13]  Chin-Chen Chang,et al.  A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..

[14]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[15]  Chun-Shien Lu,et al.  Mean-quantization-based fragile watermarking for image authentication , 2001 .

[16]  Motoi Iwata,et al.  Digital Steganography Utilizing Features of JPEG Images , 2004 .

[17]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[18]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[19]  Shiuh-Jeng Wang,et al.  VQ Applications in Steganographic Data Hiding Upon Multimedia Images , 2011, IEEE Systems Journal.

[20]  Chang-Tsun Li,et al.  Wavelet-based fragile watermarking scheme for image authentication , 2007, J. Electronic Imaging.

[21]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[23]  V. Monga Robust and Secure Image Hashing via , 2007 .

[24]  Hsiang-Cheh Huang,et al.  Reversible data hiding using histogram-based difference expansion , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[25]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[26]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[27]  Chi-Shiang Chan An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..