Abstract
Image integrity authentication has aroused concerns because of the frequent modification on images. However, most of the image authentication schemes proposed so far employed the irreversible data hiding approach and the results of the published few reversible authentication methods are not satisfactory. To improve the detection accuracy as well as marked image quality, this paper proposes an improved reversible image authentication method based on Hilbert Curve mapping. In the proposed method, pixels are first mapped to a one-dimensional vector by using Hilbert Curve and divided into non-overlapping sets. Then, authentication codes can be embedded into each set by reversible data hiding approach. After comparing the extracted bits with the original authentication codes, the image set could be taken as modified one or unmodified one. Because image redundancy can be explored more fully and more flexibly by adopting Hilbert Curve mapping, more authentication codes can be embedded into the host image while leaving less distortion. Thus, both the detection accuracy and the marked image quality can be improved. The experimental results demonstrate the improvement compared with the latest development of reversible image authentication.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Lou DC, Liu JL. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron. 2000;46(1):31–9.
Tsai PY, Hu YC, Chang CC. A novel image authentication scheme based on quadtree segmentation. Imaging Sci J. 2005;53(3):149–62.
Ababneh S, Ansari R, Khokhar A. Iterative compensation schemes for multimedia content authentication. J Vis Commun Image Represent. 2009;20(5):303–11.
Lin CY, Chang SF. A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol. 2001;11(2):153–68.
Zhang XP, Qian ZX, Ren YL, Feng GR. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forens Secur. 2011;6(4):1223–32.
Qin C, Chang CC, Chen PY. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 2012;92(4):1137–50.
Lo CC, Hu YC. A novel reversible image authentication scheme for digital images. Signal Process. 2014;98:174–85.
Xia Z, Wang X, Sun X, Wang B. Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw. 2014;7(8):1283–91.
Xia Z, Wang X, Sun X, Liu Q, Xiong N. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl. 2016;75(4):1947–62.
Yin ZX, Tang J, Liu YJ, Luo B. Data hiding algorithm with high payload based on pixel pair matching. Syst Eng Theory Pract. 2013;33(11):2972–9.
Hong W, Chen TS. A novel data embedding method using adaptive pixel pair matching. IEEE Trans Image Process. 2012;7(1):176–84.
Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Trans Circuits Syst Video Technol. 2006;16(3):354–62.
Tsai PY, Hu YC, Yeh HL. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 2009;89(6):1129–43.
Li X, Li J, Li B, Yang B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013;93:198–205.
Peng F, Li X, Yang B. Improved PVO-based reversible data hiding. Digit Signal Process. 2014;25:255–65.
Wang X, Ding J, Pei QQ. A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci. 2015;310:16–35.
Qu XC, Kim HJ. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 2015;111:249–60.
Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890–6.
Li X, Zhang W, Gui X, Yang B. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forens Secur. 2013;8(7):1091–100.
Qian Z, Zhang X. Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans Circuits Syst Video. 2015. doi:10.1109/TCSVT.2015.2418611.
Funding
This study was funded by National Natural Science Foundation of China (Grant Number 61502009 and 61472002), Anhui Provincial Natural Science Foundation (Grant Number 1508085SQF216), Key Program for Excellent Young Talents in Colleges and Universities of Anhui Province (Grant Number gxyqZD2016011), Large-scale Application Demonstration of the Education Cloud (Grant Number 2013BAH72B03) and funds of PADA & CICAEET.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Zhaoxia Yin, Xuejing Niu, Zhili Zhou, Jin Tang, and Bin Luo declare that they have no conflict of interest.
Informed Consent
All procedures followed were in accordance with the ethical standards of the responsible committee on human experimentation (institutional and national) and with the Helsinki Declaration of 1975, as revised in 2008 (5). Additional informed consent was obtained from all patients for which identifying information is included in this article.
Human and Animal Rights
This article does not contain any studies with human or animal subjects performed by the any of the authors.
Rights and permissions
About this article
Cite this article
Yin, Z., Niu, X., Zhou, Z. et al. Improved Reversible Image Authentication Scheme. Cogn Comput 8, 890–899 (2016). https://doi.org/10.1007/s12559-016-9408-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12559-016-9408-6