CELLULAR AUTOMATA BASED IMAGE AUTHENTICATION SCHEME USING EXTENDED VISUAL CRYPTOGRAPHY

被引:0
作者
Kukreja, Sonal [1 ]
Kasana, Geeta [1 ]
Kasana, Singara Singh [1 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala 147004, Punjab, India
关键词
Image authentication; cellular automata; extended visual cryptography; watermarking; normalized Hamming similarity; PSNR; SSIM; SEMI-FRAGILE WATERMARKING; SHARING SCHEME; STEGANOGRAPHY; ENCRYPTION; ALGORITHM;
D O I
10.31577/cai_2019_6_1272
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of the Visual Cryptography based image authentication schemes hide the share and authentication data into cover images by using an additional data hiding process. This process increases the computational cost of the schemes. Pixel expansion, meaningless shares and use of codebook are other challenges in these schemes. To overcome these issues, an authentication scheme is proposed in which no embedding into the cover images is performed and meaningful authentication shares are created using the watermark and cover images. This makes the scheme completely imperceptible. The watermark can be retrieved just by superimposing these authentication shares, thus reducing the computational complexity at receiver's side. Cellular Automata is used to construct the master share that provides self-construction ability to the shares. The meaningful authentication shares help in enhancing the security of the scheme while size invariance saves transmission and storage cost. The scheme possesses the ability of tamper detection and its localization. Experimental results demonstrate the improved security and quality of the generated shares of the proposed scheme as compared to existing schemes.
引用
收藏
页码:1272 / 1300
页数:29
相关论文
共 44 条
[1]   Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique [J].
Al-Otum, Hazem Munawer .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1064-1081
[2]  
Alam S, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), P332, DOI 10.1109/ICACEA.2015.7164725
[3]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[4]  
[Anonymous], 2014, T DATA HIDING MULTIM
[5]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[6]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[7]   Meaningful secret sharing technique with authentication and remedy abilities [J].
Chang, Chin-Chen ;
Chen, Yi-Hui ;
Wang, Hsin-Chi .
INFORMATION SCIENCES, 2011, 181 (14) :3073-3084
[8]   An adaptive image authentication scheme for vector quantization compressed image [J].
Chuang, Jun-Chou ;
Hu, Yu-Chen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (05) :440-449
[9]   Secret image sharing with authentication-chaining and dynamic embedding [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) :803-809
[10]   Watermarking protocols: an excursus to motivate a new approach [J].
Frattolillo, Franco .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) :587-601