An image authentication scheme based on digital watermarking and image secret sharing

被引:5
|
作者
Hsieh, Shang-Lin [1 ]
Tsai, I-Ju [1 ]
Yeh, Chung-Ping [1 ]
Chang, Chia-Ming [1 ]
机构
[1] Tatung Univ, Dept Comp Sci & Engn, Taipei 104, Taiwan
关键词
Image authentication; Origin verification; Tamper detection; Digital watermarking; Image secret sharing;
D O I
10.1007/s11042-010-0520-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.
引用
收藏
页码:597 / 619
页数:23
相关论文
共 50 条
  • [1] An image authentication scheme based on digital watermarking and image secret sharing
    Shang-Lin Hsieh
    I-Ju Tsai
    Chung-Ping Yeh
    Chia-Ming Chang
    Multimedia Tools and Applications, 2011, 52 : 597 - 619
  • [2] A novel approach to digital image watermarking based on a generalized secret sharing scheme
    Guo, HP
    Georganas, ND
    MULTIMEDIA SYSTEMS, 2003, 9 (03) : 249 - 260
  • [3] A novel approach to digital image watermarking based on a generalized secret sharing scheme
    Huiping Guo
    Nicolas D. Georganas
    Multimedia Systems, 2003, 9 : 249 - 260
  • [4] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [5] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [6] A color image watermarking scheme based on secret sharing and wavelet transform
    Hsieh, Shang-Lin
    Ran, Jh-Jie
    Tsai, I-Ju
    Huang, Bin-Yuan
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2952 - 2957
  • [7] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [8] FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Liu, Hongmei
    Rao, Junhui
    Yao, Xinzhi
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 229 - 232
  • [9] Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
    Zhang, Lina
    Wang, Tong
    Zheng, Xiangqin
    Yang, Junhan
    Lv, Liping
    Security and Communication Networks, 2021, 2021
  • [10] A reversible and lossless secret image sharing scheme with authentication for color
    Li, Wendan
    Peng, Changgen
    Tan, Weijie
    Xu, Yi
    Niu, Kun
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)