SVD-based self-embedding image authentication scheme using quick response code features

SVD is used to analyze the maximum capacity of matrix elements.Use the error correction capability of QR codes to avoid possibly detected misjudgments.Differential prediction is lossless to diminish the volume of authentication data.Two proposed schemes are superior to other schemes in terms of authenticated quality and recovery capability. Image authentication is a type of technique for the content protection of digital images. This technique is able to detect and locate tampered regions on a digital image. In this paper, two self-embedding image authentication approaches are proposed to involve distinctive singular values. Both of them extract self-characteristics of an image as the crucial authentication information for that image. Subsequently, this information is converted into the two dimensional code format and that codes are then embedded into digital image pixels. With the capability of error correction in two dimensional codes, the extracted authentication data, even being detected with a tamper, still can be completely restored and errorless. As well, it can be utilized to detect whether an image has been tampered with or not. According to experimental results, the proposed approaches are superior to other schemes for images that have been modified to a certain attack extent because the authentication data could be completely extracted in more effective way, and the tampered regions could be identified more accurately. In addition, the proposed approaches utilize these complete self-characteristics to restore tampered regions into their original states.

[1]  Afaf Tareef,et al.  A highly secure oblivious sparse coding-based watermarking system for ownership verification , 2015, Expert Syst. Appl..

[2]  Aboul Ella Hassanien,et al.  An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..

[3]  Yi-Pei Hsieh,et al.  Quantization- and Prediction-Based Image Authentication and Recovery , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.

[4]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..

[5]  Chin-Hsing Chen,et al.  Identification recovery scheme using quick response (QR) code and watermarking technique , 2014 .

[6]  Héctor M. Pérez Meana,et al.  Image Authentication Scheme Based on Self-embedding Watermarking , 2009, CIARP.

[7]  Chin-Chen Chang,et al.  Reversible data hiding with oriented and minimized distortions using cascading trellis coding , 2015, Inf. Sci..

[8]  Chen Hu,et al.  Grayscale Image Tamper Detection and Recovery Based on Vector Quantization , 2013 .

[9]  Hazem Al-Otum,et al.  Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..

[10]  Sheng-Cheng Yeh,et al.  An IMU-Based Positioning System Using QR-Code Assisting for Indoor Navigation , 2012 .

[11]  Eli Biham,et al.  An improvement of Davies’ attack on DES , 1994, Journal of Cryptology.

[12]  Chin-Hsing Chen,et al.  Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques , 2012 .

[13]  Amit Phadikar,et al.  Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..

[14]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[15]  Chi-Shiang Chan An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..

[16]  Wen-Chuan Wu,et al.  A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.