DOI QR코드

DOI QR Code

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son (Department of Information Engineering and Computer Science, Feng Chia University) ;
  • Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University) ;
  • Shih, Tso-Hsien (Department of Computer Science and Information Engineering, National Chung Cheng University)
  • Received : 2015.04.08
  • Accepted : 2015.10.14
  • Published : 2016.01.31

Abstract

Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

Keywords

References

  1. G. J. Yu, C. S. Lu, H. Y. M. Liao, “Mean quantization-based fragile watermarking for image authentication,” Opt. Eng., vol. 40, no. 7, pp. 1396–1408, 2001. Article (CrossRef Link) https://doi.org/10.1117/1.1384885
  2. H. T. Lu, R. M. Shen, F. L. Chung, “Fragile watermarking scheme for image authentication,” Electron. Lett., vol. 39, no. 12, pp. 898–900, 2003. Article (CrossRef Link) https://doi.org/10.1049/el:20030589
  3. C. T. Li, H. Si, “Wavelet-based fragile watermarking scheme for image authentication,” J. Electron. Imaging, vol. 16, no. 1, 2007. Article (CrossRef Link)
  4. H. J. He, J. S. Zhang, F. Chen, “Adjacent-block based statistical detection method for self-embedding watermarking techniques,” Signal Process., vol. 89, no. 8, pp. 1557–1566, 2009. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2009.02.009
  5. A. Swaminathan, Y.N. Mao, M. Wu, “Robust and secure image hashing,” IEEE Trans. Infor. Forens. Secur., vol. 1, no. 2, pp. 215-230, 2006. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2006.873601
  6. V. Monga, M.K. Mhcak, “Robust and secure image hashing via nonnegative matrix factorizations,” IEEE Trans. Infor. Forens. Secur., vol. 2, no. 3, pp. 376–390, 2007. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2007.902670
  7. D. Wu, X.B. Zhou, X.M. Niu, “A novel image hash algorithm resistant to print-scan,” Signal Process., vol. 89, no. 12, pp. 2415–2424, 2009. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2009.05.016
  8. A. Swaminathan, M. Wu, K.J.R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Infor. Forens. Secur., vol. 3, no. 1, pp. 101–117, 2008. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2007.916010
  9. H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Trans. Infor. Forens. Secur., vol. 4, no. 1, pp. 154–160, 2009. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2008.2012215
  10. P. W. Wong, N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001. Article (CrossRef Link) https://doi.org/10.1109/83.951543
  11. X.P. Zhang, S.Z. Wang, “Statistical fragile watermarking capable of locating individual tampered pixels,” IEEE Signal Process. Lett., vol. 14, no. 10, pp. 727–730, 2007. Article (CrossRef Link) https://doi.org/10.1109/LSP.2007.896436
  12. T.Y. Lee, S.F.D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. Article (CrossRef Link) https://doi.org/10.1016/j.patcog.2008.05.003
  13. C.S. Chan, “An image authentication method by applying Hamming code on rearranged bits,” Pattern Recognition Letters, vol. 32, no. 14, pp. 1679-1690, 2011. Article (CrossRef Link) https://doi.org/10.1016/j.patrec.2011.07.023
  14. C. Qin, C.C. Chang, P.Y. Chen, “Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism,” Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2011.11.013
  15. J.C. Chuang, Y.C. Hu, “An adaptive image authentication scheme for vector quantization compressed image,” J. Vis. Commun. Image Represent., vol. 22, no. 5, pp. 440-449, 2011. Article (CrossRef Link) https://doi.org/10.1016/j.jvcir.2011.03.011
  16. C. Qin, C.C. Chang, K.N. Chen, “Adaptive self-recovery for tampered images based on VQ indexing and inpainting,” Signal Processing, vol. 93, pp. 933-946, 2013. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2012.11.013
  17. Y.C. Hu, W.L. Chen, C.C. Lo, C.M. Wu, “A novel tamper detection scheme for BTC compressed images,” Opto-Electronics Review, vol. 21, no. 1, pp. 137-146, 2013. Article (CrossRef Link) https://doi.org/10.2478/s11772-013-0078-6
  18. Y.C. Hu, C.C. Lo, W.L. Chen, C.H. Wen, “Joint image coding and image authentication based on absolute moment block truncation coding,” Journal of Electronic Imaging, vol. 22, no. 1, pp. 1-12, 2013. Article (CrossRef Link) https://doi.org/10.1117/1.JEI.22.1.013012
  19. T.S. Nguyen, C.C. Chang, T.F. Chung, “A tamper-detection scheme for BTC-compressed images with high-quality images,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 2005-2021, 2014. Article (CrossRef Link) https://doi.org/10.3837/tiis.2014.06.011
  20. M. Iwata, K. Miyake, A. Shiozaki, “Digital steganography utilizing features of JPEG images,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, pp. 929–936, 2004. Article (CrossRef Link)
  21. J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, pp. 285–287, 2006. Article (CrossRef Link) https://doi.org/10.1109/LSP.2006.870357
  22. W.J. Wang, C.T. Huang and S.J. Wang, “VQ applications in steganographic data hiding upon multimedia images,” IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011. Article (CrossRef Link) https://doi.org/10.1109/JSYST.2011.2165603
  23. J. Tian, “Reversible data hiding using difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003. Article (CrossRef Link) https://doi.org/10.1109/TCSVT.2003.815962
  24. Z. Ni, Y. Q. Shi, N. Ansari, W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006. Article (CrossRef Link) https://doi.org/10.1109/TCSVT.2006.869964
  25. C. C. Chang, T. S. Nguyen, C. C. Lin, “Reversible image hiding for high image quality based on histogram shifting and local complexity,” International Journal of Network and Security, vol. 16, no. 3, pp. 201-213, 2014. Article (CrossRef Link)
  26. C.C. Lo, Y.C. Hu, “A novel reversible image authentication scheme for digital images,” Signal Processing, vol. 98, pp. 174-185, 2014. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2013.11.028
  27. D.M. Thodi and J.J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, pp. 721-730, 2007. Article (CrossRef Link) https://doi.org/10.1109/TIP.2006.891046
  28. V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuit Syst. Video Technol., vol. 19, no. 7, pp. 989-999, 2009. Article (CrossRef Link) https://doi.org/10.1109/TCSVT.2009.2020257
  29. [Online]. Available: http://www.cl.cam.ac.uk/-mgk25/jbigkit. Article (CrossRef Link)