REVERSIBLE WATERMARKING AUTHENTICATION ALGORITHM FOR COLOR IMAGES BASED ON COMPRESSED SENSING

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

4
Reader(s)
8
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 9 , ISSUE 2 (June 2016) > List of articles

REVERSIBLE WATERMARKING AUTHENTICATION ALGORITHM FOR COLOR IMAGES BASED ON COMPRESSED SENSING

Dong Ruihong * / Zuo Hangzhou / Zhang Qiuyu / Wu Dongfang

Keywords : image authentication, reversible watermarking, compressed sensing, difference histogram, image reconstruction.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 9, Issue 2, Pages 1,073-1,089, DOI: https://doi.org/10.21307/ijssis-2017-908

License : (CC BY-NC-ND 4.0)

Received Date : 18-December-2015 / Accepted: 30-March-2016 / Published Online: 01-June-2016

ARTICLE

ABSTRACT

Aiming at the shortcomings of existing reversible watermarking for image authentication, such as poor ability of tamper detection and localization, and low attention of reconstruction after tampering, a reversible watermarking authentication algorithm based on compressed sensing for color image was proposed. On the side of the sender, the original image has been divided into blocks and carried out compressed sensing to generate image hash which works as the watermark information, and was embedded by the reversible watermarking of difference histogram algorithm. On the side of the receiver, watermark was extracted for authentication. For the tampered block which was failed in authentication, original image will be restored by reconstruction of compressed sensing. Experimental results show that the algorithm combines of reversible watermarking and compressed sensing, so that the detection rate of image authentication has been improved, as well as the robustness to resist sparse noise and cutting and the ability to reconstruct the original image.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] Kamran, Asifullah K, Sana A M, “A high capacity reversible watermarking approach for authenticating images, Exploiting down-sampling, histogram processing, and block selection”, Information Sciences, VOL. 256, NO.1, 2014, pp.162-183. [2] Wang X, Pang K, Zhou X, et al. “A visual model based perceptual image hash for content authentication”, IEEE Transactions on Information Forensics and Security, VOL.10, NO.1, 2015, pp.1336-1349. [3] Lo C C, Hu Y C. “A novel reversible image authentication scheme for digital images”, Signal Processing, VOL. 98, NO.5, 2014, pp.174-185. [4] Farid H. “Exposing digital forgeries in scientific images”, Proceedings of the 8th workshop on Multimedia and security, Geneva, Switzerland, ACM, 2006, pp.29-36. [5] Johnson M K, Farid H. “Detecting photographic composites of people” Proceedings of the 6th International Workshop on Digital Watermarking, IWDW 2007. Guangzhou, China, Springer Berlin Heidelberg, 2008, 5041 LNCS: 19-33. [6] Swaminathan A, Mao Y, Wu M., “ Robust and secure image hashing”, IEEE Transactions on Information Forensics and Security, VOL.1, NO.2, 2006, pp.215-230. [7] Monga V, Evans B L. “Perceptual image hashing via feature points: performance evaluation and tradeoffs”, IEEE Transactions on Image Processing, VOL. 15, NO.11, 2006, pp.3452-3465. [8] Donoho D L. “Compressed sensing”, IEEE Transactions on Information Theory, VOL. 52, NO.4, 2006, pp.1289-1306. [9] Candès E J, Romberg J, Tao T. “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information”, IEEE Transactions on Information Theory, VOL. 52, NO.2, 2006, pp.489-509. [10] Kundur D, Hatzinakos D. “Digital watermarking for telltale tamper proofing and authentication”, Proceedings of the IEEE, Vol. 87, No.7, 1999, pp.1167-1180.
[11] Celik M U, Sharma G, Saber E, et al. “Hierarchical watermarking for secure image authentication with localization”, IEEE Transactions on Image Processing, VOL. 11, NO.6, 2002, pp.585-595. [12] Valenzise G, Tagliasacchi M, Tubaro S, et al. “A compressive-sensing based watermarking scheme for sparse image tampering identification”, Proceedings of the 2009 IEEE International Conference on Image Processing, ICIP 2009, Cairo, Egypt, IEEE, 2009 ,pp.1265-1268. [13] Zhang X, Qian Z, Ren Y, et al. “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction”, IEEE Transactions on Information Forensics and Security, VOL. 6, NO.4 , 2011 ,pp.1223-1232. [14] Sheikh M, Baraniuk R G. “Blind error-free detection of transform-domain watermarks”, Proceedings of the 2007 IEEE International Conference on Image Processing, ICIP 2007, San Antonio, TX, United states, IEEE, 2007, 5, pp.453-456. [15] Schaefer G, Stich M. “UCID-an uncompressed colour image database” , Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multi-media, San Jose, CA, United states, The International Society for Optical Engineering, 2004, 5307, pp.472-480. [16] Wenqing ,Chen, Tao Wang and Bailing Wang, “Design of digital image encryption algorithm based on mixed chaotic sequences", International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO.4, pp. 1453-1469, 2014. [17] Yanmin LUO, Peizhong LIU and Minghong LIAO, “An artificial immune network clustering algorithm for mangroves remote sensing”, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, No. 1, pp. 116-134, 2014. [18] Daode Zhang et al., “Research on chips defect extraction based on image-matching”, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO.1, 2014, pp.321-336.

EXTRA FILES

COMMENTS