Efficient Image Reversible Authentication Method Based on Blocks

被引:0
|
作者
Zhong Y.-Y. [1 ,2 ]
Huang F.-J. [1 ,2 ]
机构
[1] School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen
[2] Guangdong Key Laboratory of Information Security Technology, Guangzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2023年 / 34卷 / 12期
关键词
fragile watermarking; image authentication; reversible data hiding; tamper detection;
D O I
10.13328/j.cnki.jos.006803
中图分类号
学科分类号
摘要
As a new technology that combines reversible data hiding and fragile watermarking, image reversible authentication (RA) can not only realize the fragile authentication of images but also recover the original carrier image without distortion while extracting the authentication code. Thus, it is of great significance to authenticate the originality and integrity of images. Existing reversible authentication methods have low authentication accuracy and cannot effectively protect images with complex textures or some areas with complex textures in the images. To this end, this study proposes a new reversible authentication method. Firstly, images to be authenticated are divided into blocks, and the obtained sub-blocks are classified as differential blocks (DB) and shifting blocks (SB) according to their embedding capacity. Different reversible embedding methods are employed to embed the authentication codes into different types of blocks. It also adopts a hierarchical embedding strategy to increase embedding capacity and improve the authentication effects of each sub-block. On the authentication side, tamper detection and localization can be realized by the authentication code extracted from each sub-block. In addition, this method can be combined with dilation and corrosion in morphology to refine tamper detection marks and further improve the detection accuracy rate. Experimental results show that the proposed method can protect images with smooth texture and complex texture under the same authentication accuracy, and can also realize independent authentication and restoration of almost all sub-blocks, which has widespread applicability. © 2023 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:5848 / 5861
页数:13
相关论文
共 33 条
  • [1] Ghosal SK, Mandal JK., Binomial transform based fragile watermarking for image authentication, Journal of Information Security and Applications, 19, 4–5, pp. 272-281, (2014)
  • [2] Vyas C, Lunagaria M., A review on methods for image authentication and visual cryptography in digital image watermarking, Proc. of the 2014 IEEE Int’l Conf. on Computational Intelligence and Computing Research, pp. 1-6, (2014)
  • [3] Chang CC, Chen KN, Lee CF, Liu LJ., A secure fragile watermarking scheme based on chaos-and-hamming code, Journal of Systems and Software, 84, 9, pp. 1462-1470, (2011)
  • [4] Huo YR, He HJ, Chen F., Alterable-capacity fragile watermarking scheme with restoration capability, Optics Communications, 285, 7, pp. 1759-1766, (2012)
  • [5] Qin C, Ji P, Zhang XP, Dong J, Wang JW., Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy, Signal Processing, 138, pp. 280-293, (2017)
  • [6] Su GD, Chang CC, Chen CC., A hybrid-Sudoku based fragile watermarking scheme for image tampering detection, Multimedia Tools and Applications, 80, 8, pp. 12881-12903, (2021)
  • [7] Kim C, Yang CN., Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches, Applied Sciences, 11, 3, (2021)
  • [8] Zhang XP, Yin ZX., Data hiding in multimedia, Chinese Journal of Nature, 39, 2, pp. 87-95, (2017)
  • [9] Li XL., A review on image reversible data hiding, Journal of Information Security Research, 2, 8, pp. 729-734, (2016)
  • [10] Tian J., Reversible data embedding using a difference expansion, IEEE Trans. on Circuits and Systems for Video Technology, 13, 8, pp. 890-896, (2003)