Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image

被引:0
|
作者
Bi X. [1 ]
Yan W. [1 ]
Qiu Y. [1 ]
Xiao B. [1 ]
Li W. [1 ]
Ma J. [2 ]
机构
[1] Chongqing Key Laboratory of Image Cognition(Chongqing University of Posts and Telecommunications), Chongqing
[2] School of Cyber Engineering, Xidian University, Xi'an
基金
中国国家自然科学基金;
关键词
Document image; Image authentication; Image tampering recovery; PNG image; Shamir secret sharing scheme;
D O I
10.7544/issn1000-1239.20200995
中图分类号
学科分类号
摘要
An authentication based on Shamir secret sharing with tampering detection and data recovery capability for document images is proposed, which includes two processes: tampering protection generation, and tampering detection and recovery. In the process of tampering protection generation, in order to improve the tampering detection accuracy and recover effect of existing document images authentication methods, a method of tampering detection signal generation based on weight is proposed in this paper. Firstly, it extracts characteristics for each 2×3 non-overlapping block. After that, the block characteristics and block content are put into the Shamir secret sharing scheme to generate multiple shares for tampered blocks detection and repair. Finally, the shares of the block constitute the α channel plane and combine with the original image to form a PNG(portable network graphic format)image. During the authentication process, the authentication signal extracted from the shares in the α channel plane can determine whether the image block has been tampered with, and can repair the content of the tampered image block through the reverse operation of Shamir secret sharing scheme. Experiments show that the proposed method not only has good tamper detection and the effectiveness of data repair, but also has good robustness against image clipping and noise attack. © 2022, Science Press. All right reserved.
引用
收藏
页码:1356 / 1369
页数:13
相关论文
共 20 条
  • [1] Tzeng C H, Tsai W H., A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement, IEEE Communications Letters, 7, 9, pp. 443-445, (2003)
  • [2] Wu Min, Liu Bede, Data hiding in binary image for authentication and annotation, IEEE Transactions on Multimedia, 6, 4, pp. 528-538, (2004)
  • [3] Yang Huijuan, Kot A C., Binary image authentication with tampering localization by embedding cryptographic signature and block identifier, IEEE Signal Processing Letters, 13, 12, pp. 741-744, (2006)
  • [4] Yang Huijuan, Kot A C., Pattern-based data hiding for binary image authentication by connectivity-preserving, IEEE Transactions on Multimedia, 9, 3, pp. 475-486, (2007)
  • [5] Feng Bingwen, Lu Wei, Sun Wei, Secure binary image steganography based on minimizing the distortion on the texture, IEEE Transactions on Information Forensics and Security, 10, 2, pp. 243-255, (2015)
  • [6] Zhang Junhong, Lu Wei, Yin Xiaolin, Et al., Binary image steganography based on joint distortion measurement, Journal of Visual Communication and Image Representation, 58, 1, pp. 600-605, (2019)
  • [7] Filler T, Judas J, Fridrich J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
  • [8] Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
  • [9] Lee C W, Tsai W H., A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability, IEEE Transactions on Image Processing, 21, 1, pp. 207-218, (2011)
  • [10] Ghazi M, Salman H M A., Secret sharing scheme based technique for authentication of documents images, Engineering and Technology Journal, 32, 6, pp. 1092-1105, (2014)