Reversible Authentication Scheme Based on Prediction-Error Expansion with Compound Symbolic Chaos

被引:0
作者
Gao, Guangyong [1 ]
Cui, Zongmin [1 ]
Zhou, Caixue [1 ]
Yao, Shimao [1 ]
Xu, Liya [1 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Peoples R China
来源
PROCEEDINGS OF THE 2016 12TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA) | 2016年
关键词
WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a reversible authentication scheme based on prediction-error expansion (PEE) is proposed. Firstly, the compound symbolic chaos sequence as well as image block pixel bits and position-bits are input into a hash function to produce hash-bits. Then exclusive-or operation, between the label-bits taken from the chaos sequence and hash-bits, is performed to generate the check bits, which are embedded into the image as short watermarking using PEE method. For each block, the observations are achieved by compressed sensing (CS), which are registered in the intellectual property rights (IPR) database as long watermarking. At receiver side, image integrity authentication and tamper localization are determined by the generated label-bits. The blocks without being tampered can he recovered reversibly to original state, and the tampered blocks can be restored using CS reconstruction algorithm with the extracted long watermarking. Experimental results demonstrate the proposed scheme outperforms some state-of-the-art similar schemes.
引用
收藏
页码:2169 / 2174
页数:6
相关论文
共 12 条
[1]   Compressed sensing [J].
Donoho, DL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (04) :1289-1306
[2]   On Local Prediction Based Reversible Watermarking [J].
Dragoi, Ioan-Catalin ;
Coltuc, Dinu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (04) :1244-1246
[3]  
Fridrich J, 2000, IEEE IMAGE PROC, P446, DOI 10.1109/ICIP.2000.900991
[4]   Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform [J].
Gao, Guangyong ;
Shi, Yun-Qing .
IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (11) :2078-2082
[5]  
Gil Q., 2008, P INT C IM SIGN PROC, P95
[6]  
Lo C., 2015, SIGNAL PROCESS, V98, P174
[7]   A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization [J].
Qi, Xiaojun ;
Xin, Xing .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 30 :312-327
[8]   Enhancement of scale-free network attack tolerance [J].
Qu Ze-Hui ;
Wang Pu ;
Song Chao-Ming ;
Qin Zhi-Guang .
CHINESE PHYSICS B, 2010, 19 (11)
[9]  
Thodi DM, 2004, IEEE IMAGE PROC, P1549
[10]   Signal recovery from random measurements via orthogonal matching pursuit [J].
Tropp, Joel A. ;
Gilbert, Anna C. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (12) :4655-4666