Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A new data hiding scheme for binary image authentication with small image distortion

Published: 01 November 2009 Publication History

Abstract

A new data hiding scheme for binary image authentication that has a small distortion of the cover image is proposed in this paper. Using the data-embedding algorithm that is based on Hamming codes, the proposed scheme embeds authentication information into the cover image with flipping only a small number of pixels. A special type of the pixels are selected and flipped by a new algorithm to minimize visual distortion. This new algorithm is based on ELSSM (Edge Line Segment Similarity Measure). Randomly shuffling the bit-order of the authentication information to be embedded, the information can only be extracted by the designated receiver who has the symmetric key. We employ two measurement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the feasibility of the proposed scheme. Using these metrics, we analyze the proposed scheme and the previous schemes. The analysis reveals that the proposed scheme requires less image distortion than the previous schemes whilst achieving the same level of the miss detection rate. Experimental results demonstrate that the proposed scheme is more resilient against recent steganalysis attacks than the previous schemes.

References

[1]
S. Akl, H. Meijer, A fast pseudo random permutation generator with applications for cryptology, in: Proc. Advances in Cryptology: CRYPTO, LNCS, vol. 196, 1985, pp. 269-275.
[2]
Cachin, C., An information-theoretic model for steganography. Information and Computation. v192 i1. 41-56.
[3]
Chang, Chin-Chen, Wu, Wen-Chuan and Chen, Yi-Hui, Joint coding and embedding techniques for multimedia images. Information Sciences. v178 i18. 3543-3556.
[4]
J. Cheng, A.C. Kot, Objective distortion measure for binary images, in: Proc. IEEE TENCON, 2004, pp. 355-358.
[5]
Cheng, J. and Kot, A.C., Objective distortion measure for binary text image based on edge line segment similarity. IEEE Transactions on Image Processing. v16 i6. 1691-1695.
[6]
J. Cheng, A.C. Kot, J. Liu, H. Cao, Detection of data hiding in binary text image, in: Proc. IEEE International Conference on Image Processing (ICIP), vol. 3, 2005, pp. 73-76.
[7]
J.Cheng, A.C. Kot, S. Rahardja, Steganalysis of binary cartoon image using distortion measure, in: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 2, 2007, pp. 261-264.
[8]
D. Eastlake, T. Hansen, US Secure Hash Algorithms (SHA and HMAC-SHA), IETF RFC 4634, 2006. <http://www.ietf.org/rfc/rfc4634.txt?number=4634>.
[9]
FIPS 140-2, Security requirements for cryptographic modules: compromising the security of the key establishment method, NIST.
[10]
Fridrich, J. and Soukal, D., Matrix embedding for large payloads. IEEE Transactions on Information Forensics and Security. v6 i4. 528-538.
[11]
Guo, H., Li, Y. and Jajodia, S., Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences. v177 i1. 281-298.
[12]
N. Hopper, J. Langford, L. von Ahn, Provably secure steganography, in: Proc. Advances in Cryptology: CRYPTO, LNCS, vol. 2442, 2002, pp. 77-92.
[13]
S. Hsieh, J. Jian, I. Tsai, B. Huang, A color image watermarking scheme based on secret sharing and wavelet transform, in: Proc. IEEE International Conference on Systems, Man and Cybernetics, 2007, pp. 2143-2148.
[14]
H. Kim, A new public-key authentication watermarking for binary document images resistant to parity checks, in: Proc: IEEE International Conferences on Image Processing (ICIP), vol. 2, 2005, pp. 1074-1077.
[15]
H. Kim, A. Afif, Secure authentication watermarking for binary images, in: Proc. Brazilian Symposium on Computer Graphics and Image Processing, 2003, pp. 199-206.
[16]
Kim, H. and Afif, A., A secure authentication watermarking for halftone and binary images. International Journal of Imaging Systems and Technology. v14 i4. 147-152.
[17]
H. Kim, R. Queiroz, Alteration-locating authentication watermarking for binary images, in: Proc. International Workshop on Digital Watermarking (IWDW), LNCS, vol. 3304, 2005, pp. 125-136.
[18]
T. Krovetz, Message authentication on 64-bit architectures, in: Proc. Selected Areas in Cryptography, LNCS, vol. 4356, 2007, pp. 327-341.
[19]
Lee, Y., Hur, J., Kim, H., Park, Y. and Yoon, H., A new binary image authentication scheme with small distortion and low false negative rates. IEICE Transactions on Communications. vE90-B i11. 3259-3261.
[20]
Li, X. and Wang, J., A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences. v177 i15. 3099-3109.
[21]
H. Liu, Z. Zhang, J. Huang, X. Huang, Y. Shi, A high capacity distortion-free data hiding algorithm for palette image, in: Proc. International Symposium on Circuits and Systems (ISCAS), vol. 2, 2003, pp. 916-919.
[22]
Lu, H., Kot, A.C. and Shi, Y., Distance-reciprocal distortion measure for binary document images. IEEE Signal Processing Letters. v11 i2. 228-231.
[23]
Luby, M. and Rackoff, C., How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing. v17 i2. 373-386.
[24]
S. Myers, Efficient-amplification of the security of weak pseudo-random function generators, in: Proc. Advances in Cryptology: EUROCRYPT, LNCS, vol. 2045, 2001, pp. 358-372.
[25]
G. Pan, Z. Wu, Y. Pan, A data hiding method for few-color images, in: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, 2002, pp. 3469-3472.
[26]
Rey, C. and Duglay, R., A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing. v2002 i6. 613-621.
[27]
Tsai, H. and Sun, D., Color image watermark extraction based on support vector machines. Information Sciences. v177 i2. 550-569.
[28]
Tzeng, C. and Tsai, W., A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters. v7 i9. 443-445.
[29]
A. Westfield, high capacity despite better steganalysis (F5-A steganographic algorithm), in: Proc. Information Hiding, 4th International Workshop, LNCS, vol. 2137, 2001, pp. 289-302.
[30]
Wang, F., Yen, K., Jain, L. and Pan, J., Multiuser-based shadow watermark extraction system. Information Sciences. v177 i12. 2522-2532.
[31]
M. Wu, J. Fridrich, M. Goljan, H. Gu, Handling uneven embedding capacity in binary images: a revisit, in: Proc. SPIE, Security, steganography, and watermarking of multimedia contents, vol. 5681, 2005, pp. 194-205.
[32]
Wu, M. and Liu, B., Data hiding in binary images for authentication and annotation. IEEE Transactions on Multimedia. v6 i4. 528-538.
[33]
Yang, H. and Kot, A.C., Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Transactions on Multimedia. v9 i3. 475-486.

Cited By

View all
  1. A new data hiding scheme for binary image authentication with small image distortion

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Information Sciences: an International Journal
    Information Sciences: an International Journal  Volume 179, Issue 22
    November, 2009
    142 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 November 2009

    Author Tags

    1. Authentication codes
    2. Digital watermarking
    3. Image authentication
    4. Information hiding
    5. Security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Reversible data hiding with interpolation and adaptive embeddingMultimedia Tools and Applications10.1007/s11042-018-6616-y78:8(10795-10819)Online publication date: 1-Apr-2019
    • (2018)VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacementsThe Journal of Supercomputing10.1007/s11227-016-1874-974:9(4295-4314)Online publication date: 1-Sep-2018
    • (2016)High capacity data hiding for binary image based on block classificationMultimedia Tools and Applications10.1007/s11042-015-2768-175:14(8513-8526)Online publication date: 1-Jul-2016
    • (2012)Adjustable prediction-based reversible data hidingDigital Signal Processing10.1016/j.dsp.2012.05.01522:6(941-953)Online publication date: 1-Dec-2012
    • (2011)Perceptually adaptive spread transform image watermarking scheme using Hadamard transformInformation Sciences: an International Journal10.1016/j.ins.2010.09.029181:3(450-465)Online publication date: 1-Feb-2011
    • (2010)Hiding data in parity check bitProceedings of the 4th International Conference on Uniquitous Information Management and Communication10.1145/2108616.2108679(1-5)Online publication date: 14-Jan-2010
    • (2010)Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statisticsInformation Sciences: an International Journal10.1016/j.ins.2010.02.024180:13(2540-2559)Online publication date: 1-Jul-2010

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media