An efficient reversible image authentication method using improved PVO and LSB substitution techniques

被引:25
|
作者
Hong, Wien [1 ,2 ]
Chen, Meijin [1 ]
Chen, Tung Shou [3 ]
机构
[1] Sun Yat Sen Univ, Nanfang Coll, Dept Elect Commun & Software Engn, Guangzhou, Guangdong, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
关键词
Authentication; Tamper detection; Reversible; DETECTION SCHEME; SEGMENTATION; ALGORITHM;
D O I
10.1016/j.image.2017.07.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The reversible image authentication (RIA) method is capable of detecting the tampered regions, and is able to reconstruct the original image if the marked image is un-tampered. The existing RIA methods successfully detect the integrity of digital images and have the ability to recover the original image from its marked version. However, they fail to detect the tampered regions with equal modification in brightness. Moreover, the existing methods also provide no mechanism to protect those un-embeddable blocks and thus a larger detection error rate can be introduced. In this paper, instead of embedding block-independent authentication code (AC) used in other methods, we embed hash value of block features to avoid the tampered regions that are undetectable in prior works. Besides, we also embed one bit AC into the least significant bit (LSB) of those un-embeddable blocks for the authentication purpose while achieving reversibility. The experimental results show that the proposed method offers a more accurate detection result while providing a comparable image quality. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:111 / 122
页数:12
相关论文
共 50 条
  • [1] An efficient reversible image authentication method
    Han, Seungwu
    Fujiyoshi, Masaaki
    Kiya, Hitoshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (08) : 1907 - 1914
  • [2] Reversible image authentication based on combination of reversible and LSB algorithm
    Gao, Tiegang
    Gu, Qiaolun
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 636 - +
  • [3] Design of Image Steganography using LSB XOR Substitution Method
    Arun, Chandni
    Murugan, Senthil
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 674 - 677
  • [4] On Combining MD5 for Image Authentication using LSB Substitution in Selected Pixels
    Wahid, Muneeza
    Ahmed, Nasir
    Zafar, Muhammad Haseeb
    Khan, Sahib
    [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING & EMERGING TECHNOLOGIES (ICEET), 2018, : 125 - 130
  • [5] Reversible Watermarking in Digital Image Using PVO and RDWT
    Gao, Lin
    Gao, Tiegang
    Zhao, Jie
    Liu, Yonglei
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2018, 10 (02) : 40 - 55
  • [6] Improved Reversible Image Authentication Scheme
    Zhaoxia Yin
    Xuejing Niu
    Zhili Zhou
    Jin Tang
    Bin Luo
    [J]. Cognitive Computation, 2016, 8 : 890 - 899
  • [7] Improved Reversible Image Authentication Scheme
    Yin, Zhaoxia
    Niu, Xuejing
    Zhou, Zhili
    Tang, Jin
    Luo, Bin
    [J]. COGNITIVE COMPUTATION, 2016, 8 (05) : 890 - 899
  • [8] Efficient LSB Substitution for Interpolation based Reversible Data Hiding Scheme
    Wahed, Md Abdul
    Nyeem, Hussain
    [J]. 2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2017,
  • [9] Enhanced Color Image Method for Watermarking in RGB Space Using LSB Substitution
    Bouchane, Mouna
    Tarhda, Mohamed
    Hlou, Laamari
    [J]. PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015, VOL 1, 2016, 380 : 157 - 164
  • [10] Image Steganography using improved algorithms to enhance security and payload of traditional LSB Substitution
    Bhagat, Jayti
    Gupta, Pragya
    Kohli, Neeraj
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,