An Image Authentication Method for Secure Internet-Based Communication in Human-Centric Computing

被引:2
作者
Chen, Yung-Yao [1 ]
Hsia, Chih-Hsien [2 ]
Kao, Hsiang-Yun [3 ]
Wang, You-An [3 ]
Hu, Yu-Chen [4 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect & Comp Engn, Taipei, Taiwan
[2] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan, Taiwan
[3] Natl Taipei Univ Technol, Grad Inst Automat Technol, Taipei, Taiwan
[4] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 07期
关键词
Image authentication; Secure internet-based communication; Human-centric computing; Data hiding; Steganography; DATA HIDING SCHEME;
D O I
10.3966/160792642020122107004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of computing technologies, human-centered computing (HCC) has become an emerging multidisciplinary area which integrates ubiquitous computing, wearable computing, and so on. When large amounts of information has to be mutually analyzed, HCC aims to bridge the gap between people and computing systems. However, ensuring a secure transmission becomes challenging in HCC because malicious hackers tend to tamper with the Internet data. The massive amount of counterfeited or tampered data on the Internet damage data trustworthiness and impede the progress of HCC. To address this problem, this study presented an image authentication method based on the residual histogram shifting technique. In this technique, an image histogram is generated using block-based processing. Then, the histogram is modified to achieve a high embedding capacity. By manipulating the image histogram, secret or authentication codes can be embedded in the image itself to prevent private information from being tampered without consent. The quality of the obtained stego image is preserved because the shifting of the histogram is controlled to be within the minimum degree. Moreover, the proposed image authentication method is a reversible scheme which can recover the original host image from the stego image. From the experimental results, it reveals that the proposed method provides larger hiding capacity than the state-of-the-art methods, while maintaining pleasing image qualities of the embedded images.
引用
收藏
页码:1893 / 1903
页数:11
相关论文
共 40 条
  • [21] An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication
    Tiwari, Archana
    Sharma, Manisha
    PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 : 215 - 225
  • [22] Human-centric computing for inequality energy classification in smart cities: Who gets left to margins while improving quality of life through advanced approaches?
    Lyu, Hongmei
    Wu, Tong
    Komori, Naoko
    Wu, Xiyue
    SUSTAINABLE CITIES AND SOCIETY, 2024, 107
  • [23] A novel Frei-Chen based fragile watermarking method for authentication of an image
    Renklier, Ayhan
    Ozturk, Serkan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22)
  • [24] A Chaos-based Fragile Watermarking Method in Spatial Domain for Image Authentication
    Munir, Rinaldi
    2015 INTERNATIONAL SEMINAR ON INTELLIGENT TECHNOLOGY AND ITS APPLICATIONS (ISITIA), 2015, : 227 - 231
  • [25] DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication
    Xiong, Lizhi
    Zhong, Xinwei
    Yang, Ching-Nung
    SIGNAL PROCESSING, 2020, 173
  • [26] An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud
    Alam, Md. Khorshed
    Nushrat, Samia
    Patwary, Md. Amir Hamza
    Ullah, Ahsan
    Robin, Kazi Hassan
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 215 - 233
  • [27] A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication
    Kaur, Rajwinder
    Singh, Butta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20357 - 20386
  • [28] RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things
    Xiong, Lizhi
    Han, Xiao
    Zhong, Xinwei
    Yang, Ching-Nung
    Xiong, Neal N.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) : 1933 - 1945
  • [29] A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability
    Lee, Che-Wei
    Tsai, Wen-Hsiang
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (01) : 207 - 218
  • [30] A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping
    Zhang, Pei
    Cheng, Qingfeng
    Zhang, Mingliang
    Luo, Xiangyang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4469 - 4480