Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2011.18B.6.355

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking  

Yeo, Dong-Gyu (국립금오공과대학교 모바일연구소)
Lee, Hae-Yeoun (국립금오공과대학교 컴퓨터공학부)
Abstract
In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.
Keywords
Image Authentication; Reversible Watermarking; Differential Histogram;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D.-G. Yeo, H.-Y. Lee, and B. M. Kim, "High Capacity Reversible Watermarking using Differential Histogram Shifting and Predicted Error Compensation," Journal of Electronic Imaging, SPIE, Vol.20, No.1, 2011.
2 S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007.   DOI   ScienceOn
3 J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, 2003.   DOI   ScienceOn
4 D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007.   DOI   ScienceOn
5 Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, Mar., 2006.   DOI   ScienceOn
6 W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, Springer-Verlag, Qing Dao, China, pp.1152-1161, 2007.
7 S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, Springer-Verlag, Tokyo, Japan, pp.340-347, 2005.
8 P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009.   DOI   ScienceOn
9 K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between sub-sampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009.   DOI   ScienceOn
10 D.-G. Yeo, H.-Y. Lee, B. M. Kim, K.-S. Kim, "Reversible Image Watermarking with Differential Histogram Shifting and Error Prediction Compensation," Journal of KIISE : Software and Applications, Vol.37, No.6, pp.417-429, 2010.
11 X. Q. Zhou, H. K. Huang, S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. Medical Imaging, Vol.20, No.8, pp.784-791, Aug., 2001.   DOI   ScienceOn
12 A. U. Rajendra, D. Anand, B. P. Subbanna, U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Information Technology in Biomedicine, Vol.5, No.4, pp.320-323, Dec., 2001.   DOI   ScienceOn
13 G.-J. Yu, C.-S. Lu, H.-Y. M. Liao, "Mean-quantization-based fragile watermarking for image authentication," Optical Engineering, Vol.40, No.7, pp.1396-1408, Jul., 2001.   DOI   ScienceOn
14 K.-F. Li, T.-S. Chen, S.-C. Wu, "Image tamper detection and recovery system based on discrete wavelet transform," IEEE Pacific Rim Conf. on Communications, Computers and Signal Processing, Vol.1, pp.164-167, Aug., 2001.
15 P.-L. Lin, P.-W. Huang, A.-W. Peng, "A fragile watermarking scheme for image authentication with localization and recovery," IEEE Sixth International Symposium on Multimedia Software Engineering, pp.146-153, Dec., 2004.
16 C.-L. Wang, R.-H. Hwang, T.-S. Chen, H.-Y. Lee, "Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding," 19th International Conference on Advanced Information Networking and Applications, 2005.
17 I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
18 P. L. Lin, C. K. Hsieh, P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol.38, No.12, pp.2519-2529, Dec., 2005.   DOI   ScienceOn
19 T.-Y. Lee, S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, Vol.41, No.11, pp.3497-3506, Nov., 2008.   DOI   ScienceOn
20 M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005.   DOI   ScienceOn
21 M. Awrangjeb, "An Overview of Reversible Data Hiding," Proc. of the Sixth International Conference on Computer and Information Technology, Jahangirnagar University, Bangladesh, pp.75-79, 2003.