A secure and improved self-embedding algorithm to combat digital document forgery

被引:39
作者
Cheddad, Abbas
Condell, Joan
Curran, Kevin
Mc Kevitt, Paul
机构
[1] School of Computing and Intelligent Systems, Faculty of Computing and Engineering, University of Ulster at Magee
关键词
Image processing; Steganography; Information hiding; Self-embedding; Encryption; Document forgery; Security; WATERMARKING;
D O I
10.1016/j.sigpro.2009.02.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose here a solution to this real world problem through a ID hash algorithm coupled with 2D iFFT (irreversible Fast Fourier Transform) to encrypt digital documents in the 2D spatial domain. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. This work exploits Jarvis' kernel to generate the error diffusion signal and the Wavelet-based Inverse Halftoning via De-convolution (WInHD) to recover the approximation of the original signal. Our method not only points out forgery but also allows legal or forensics expert gain access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2324 / 2332
页数:9
相关论文
共 34 条
[1]  
[Anonymous], P PAC RIM WORKSH DIG
[2]  
[Anonymous], 1975, P SID
[3]  
[Anonymous], THESIS DARTMOUTH COL
[4]  
[Anonymous], 1999, P S CONT SEC DAT HID
[5]  
[Anonymous], P 9 ACM INT C MULT O
[7]  
CHEDDAD A, 2008, P IEEE INT C DIG INF, P563
[8]  
DENG C, 2007, IEEE INT C MACH LEAR, V4, P2125
[9]   Invariant Image Watermarking Based on Local Feature Regions [J].
Deng, Cheng ;
Gao, Xinbo ;
Li, Xuelong ;
Tao, Dacheng .
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, :6-+
[10]  
Deng C, 2008, IEEE IMAGE PROC, P413, DOI 10.1109/ICIP.2008.4711779