A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

被引:23
作者
Lee, Che-Wei [1 ]
Tsai, Wen-Hsiang [1 ,2 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Asia Univ, Dept Informat Commun, Taichung 41354, Taiwan
关键词
Data hiding; data repair; grayscale document image; image authentication; Portable Network Graphics (PNG) image; secret sharing; BINARY IMAGE; WATERMARKING; DISTORTION; LOCALIZATION; SCHEME;
D O I
10.1109/TIP.2011.2159984
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.
引用
收藏
页码:207 / 218
页数:12
相关论文
共 13 条
[1]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[2]   A secure authentication watermarking for halftone and binary images [J].
Kim, HY ;
Afif, A .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2004, 14 (04) :147-152
[3]   A new binary image authentication scheme with small distortion and low false negative rates [J].
Lee, Younho ;
Hur, Junbeom ;
Kim, Heeyoul ;
Park, Yongsu ;
Yoon, Hyunsoo .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (11) :3259-3262
[4]   A new data hiding scheme for binary image authentication with small image distortion [J].
Lee, Younho ;
Kim, Heeyoul ;
Park, Yongsu .
INFORMATION SCIENCES, 2009, 179 (22) :3866-3884
[5]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[6]   Multipurpose watermarking for image authentication and protection [J].
Lu, CS ;
Liao, HYM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) :1579-1592
[7]   Multipurpose image watermarking algorithm based on multistage vector quantization [J].
Lu, ZM ;
Xu, DG ;
Sun, SH .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (06) :822-831
[8]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[9]   MOMENT-PRESERVING THRESHOLDING - A NEW APPROACH [J].
TSAI, WH .
COMPUTER VISION GRAPHICS AND IMAGE PROCESSING, 1985, 29 (03) :377-393
[10]   A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement [J].
Tzeng, CH ;
Tsai, WH .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (09) :443-445