An Image Authentication Method for Secure Internet-Based Communication in Human-Centric Computing

被引:2
|
作者
Chen, Yung-Yao [1 ]
Hsia, Chih-Hsien [2 ]
Kao, Hsiang-Yun [3 ]
Wang, You-An [3 ]
Hu, Yu-Chen [4 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect & Comp Engn, Taipei, Taiwan
[2] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan, Taiwan
[3] Natl Taipei Univ Technol, Grad Inst Automat Technol, Taipei, Taiwan
[4] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 07期
关键词
Image authentication; Secure internet-based communication; Human-centric computing; Data hiding; Steganography; DATA HIDING SCHEME;
D O I
10.3966/160792642020122107004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of computing technologies, human-centered computing (HCC) has become an emerging multidisciplinary area which integrates ubiquitous computing, wearable computing, and so on. When large amounts of information has to be mutually analyzed, HCC aims to bridge the gap between people and computing systems. However, ensuring a secure transmission becomes challenging in HCC because malicious hackers tend to tamper with the Internet data. The massive amount of counterfeited or tampered data on the Internet damage data trustworthiness and impede the progress of HCC. To address this problem, this study presented an image authentication method based on the residual histogram shifting technique. In this technique, an image histogram is generated using block-based processing. Then, the histogram is modified to achieve a high embedding capacity. By manipulating the image histogram, secret or authentication codes can be embedded in the image itself to prevent private information from being tampered without consent. The quality of the obtained stego image is preserved because the shifting of the histogram is controlled to be within the minimum degree. Moreover, the proposed image authentication method is a reversible scheme which can recover the original host image from the stego image. From the experimental results, it reveals that the proposed method provides larger hiding capacity than the state-of-the-art methods, while maintaining pleasing image qualities of the embedded images.
引用
收藏
页码:1893 / 1903
页数:11
相关论文
共 50 条
  • [1] Advances in intelligence and internet of things for human-centric computing
    Yi Pan
    Jong Hyuk Park
    Soft Computing, 2018, 22 : 4165 - 4167
  • [2] Advances in intelligence and internet of things for human-centric computing
    Pan, Yi
    Park, Jong Hyuk
    SOFT COMPUTING, 2018, 22 (13) : 4165 - 4167
  • [3] Human-Centric Computing
    Rabaey, Jan M.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (01) : 3 - 11
  • [4] Host-based intrusion detection system for secure human-centric computing
    Daesung Moon
    Sung Bum Pan
    Ikkyun Kim
    The Journal of Supercomputing, 2016, 72 : 2520 - 2536
  • [5] Host-based intrusion detection system for secure human-centric computing
    Moon, Daesung
    Pan, Sung Bum
    Kim, Ikkyun
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2520 - 2536
  • [6] Human-Centric Computing
    Rabaey, Jan M.
    2021 IEEE INTERNATIONAL ELECTRON DEVICES MEETING (IEDM), 2021,
  • [7] Human-Centric Technology Based on Orange Computing
    Wang, Hung-Yi
    Chen, Bo-Wei
    Bharanitharan, K.
    Wu, Jaw-Shyang
    Tseng, Shih-Pang
    Wang, Jhing-Fa
    1ST INTERNATIONAL CONFERENCE ON ORANGE TECHNOLOGIES (ICOT 2013), 2013, : 250 - 251
  • [8] TOWARD A HUMAN-CENTRIC INTERNET
    West, Jessamyn
    LIBRARY JOURNAL, 2010, 135 (02) : 24 - 25
  • [9] Overview of Human-Centric Computing
    Iida, Ichiro
    Morita, Toshihiko
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2012, 48 (02): : 124 - 128
  • [10] Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain
    Kim, Hyun-Woo
    Jeong, Young-Sik
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8