Browse > Article
http://dx.doi.org/10.3837/tiis.2016.01.023

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images  

Nguyen, Thai-Son (Department of Information Engineering and Computer Science, Feng Chia University)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University)
Shih, Tso-Hsien (Department of Computer Science and Information Engineering, National Chung Cheng University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.1, 2016 , pp. 395-413 More about this Journal
Abstract
Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.
Keywords
Image authentication; tamper detection; fragile watermark; reversibility; high quality;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y.C. Hu, W.L. Chen, C.C. Lo, C.M. Wu, “A novel tamper detection scheme for BTC compressed images,” Opto-Electronics Review, vol. 21, no. 1, pp. 137-146, 2013. Article (CrossRef Link)   DOI
2 J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, pp. 285–287, 2006. Article (CrossRef Link)   DOI
3 Y.C. Hu, C.C. Lo, W.L. Chen, C.H. Wen, “Joint image coding and image authentication based on absolute moment block truncation coding,” Journal of Electronic Imaging, vol. 22, no. 1, pp. 1-12, 2013. Article (CrossRef Link)   DOI
4 T.S. Nguyen, C.C. Chang, T.F. Chung, “A tamper-detection scheme for BTC-compressed images with high-quality images,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 2005-2021, 2014. Article (CrossRef Link)   DOI
5 M. Iwata, K. Miyake, A. Shiozaki, “Digital steganography utilizing features of JPEG images,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, pp. 929–936, 2004. Article (CrossRef Link)
6 W.J. Wang, C.T. Huang and S.J. Wang, “VQ applications in steganographic data hiding upon multimedia images,” IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011. Article (CrossRef Link)   DOI
7 J. Tian, “Reversible data hiding using difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003. Article (CrossRef Link)   DOI
8 Z. Ni, Y. Q. Shi, N. Ansari, W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006. Article (CrossRef Link)   DOI
9 H. J. He, J. S. Zhang, F. Chen, “Adjacent-block based statistical detection method for self-embedding watermarking techniques,” Signal Process., vol. 89, no. 8, pp. 1557–1566, 2009. Article (CrossRef Link)   DOI
10 G. J. Yu, C. S. Lu, H. Y. M. Liao, “Mean quantization-based fragile watermarking for image authentication,” Opt. Eng., vol. 40, no. 7, pp. 1396–1408, 2001. Article (CrossRef Link)   DOI
11 H. T. Lu, R. M. Shen, F. L. Chung, “Fragile watermarking scheme for image authentication,” Electron. Lett., vol. 39, no. 12, pp. 898–900, 2003. Article (CrossRef Link)   DOI
12 C. T. Li, H. Si, “Wavelet-based fragile watermarking scheme for image authentication,” J. Electron. Imaging, vol. 16, no. 1, 2007. Article (CrossRef Link)
13 A. Swaminathan, Y.N. Mao, M. Wu, “Robust and secure image hashing,” IEEE Trans. Infor. Forens. Secur., vol. 1, no. 2, pp. 215-230, 2006. Article (CrossRef Link)   DOI
14 V. Monga, M.K. Mhcak, “Robust and secure image hashing via nonnegative matrix factorizations,” IEEE Trans. Infor. Forens. Secur., vol. 2, no. 3, pp. 376–390, 2007. Article (CrossRef Link)   DOI
15 D. Wu, X.B. Zhou, X.M. Niu, “A novel image hash algorithm resistant to print-scan,” Signal Process., vol. 89, no. 12, pp. 2415–2424, 2009. Article (CrossRef Link)   DOI
16 A. Swaminathan, M. Wu, K.J.R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Infor. Forens. Secur., vol. 3, no. 1, pp. 101–117, 2008. Article (CrossRef Link)   DOI
17 X.P. Zhang, S.Z. Wang, “Statistical fragile watermarking capable of locating individual tampered pixels,” IEEE Signal Process. Lett., vol. 14, no. 10, pp. 727–730, 2007. Article (CrossRef Link)   DOI
18 H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Trans. Infor. Forens. Secur., vol. 4, no. 1, pp. 154–160, 2009. Article (CrossRef Link)   DOI
19 C.S. Chan, “An image authentication method by applying Hamming code on rearranged bits,” Pattern Recognition Letters, vol. 32, no. 14, pp. 1679-1690, 2011. Article (CrossRef Link)   DOI
20 P. W. Wong, N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001. Article (CrossRef Link)   DOI
21 T.Y. Lee, S.F.D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. Article (CrossRef Link)   DOI
22 C. Qin, C.C. Chang, P.Y. Chen, “Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism,” Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012. Article (CrossRef Link)   DOI
23 J.C. Chuang, Y.C. Hu, “An adaptive image authentication scheme for vector quantization compressed image,” J. Vis. Commun. Image Represent., vol. 22, no. 5, pp. 440-449, 2011. Article (CrossRef Link)   DOI
24 C. Qin, C.C. Chang, K.N. Chen, “Adaptive self-recovery for tampered images based on VQ indexing and inpainting,” Signal Processing, vol. 93, pp. 933-946, 2013. Article (CrossRef Link)   DOI
25 V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuit Syst. Video Technol., vol. 19, no. 7, pp. 989-999, 2009. Article (CrossRef Link)   DOI
26 C. C. Chang, T. S. Nguyen, C. C. Lin, “Reversible image hiding for high image quality based on histogram shifting and local complexity,” International Journal of Network and Security, vol. 16, no. 3, pp. 201-213, 2014. Article (CrossRef Link)
27 C.C. Lo, Y.C. Hu, “A novel reversible image authentication scheme for digital images,” Signal Processing, vol. 98, pp. 174-185, 2014. Article (CrossRef Link)   DOI
28 D.M. Thodi and J.J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, pp. 721-730, 2007. Article (CrossRef Link)   DOI
29 [Online]. Available: http://www.cl.cam.ac.uk/-mgk25/jbigkit. Article (CrossRef Link)