A Grayscale Image Authentication Method with a Pixel-level Self-recovering Capability against Image Tampering
نویسندگان
چکیده
A new grayscale image authentication method with a pixel-level self-recovering capability for tampered region repairing is proposed. By dividing the grayscale range into bins, a 3-bit bin code is generated as the authentication signal for each pixel in the input cover image. The authentication signals then are embedded randomly into the image pixels for the double purposes of tampering localization and data repairing in the image authentication process. This leads to great saving of storage space for embedding the signals and recovery data, and so results in the possibility of pixel-level authentication. Tampered pixel repairing is conducted by retrieving the embedded bin code to obtain a corresponding representative value for use as the new gray value of the tempered pixel. Good experimental results show the effectiveness of the proposed method.
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملAuthentication of Grayscale Images and Data Repairing Using Secret Sharing Method
Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملA quantization-based semi-fragile watermarking scheme for image content authentication
1047-3203/$ see front matter 2010 Elsevier Inc. A doi:10.1016/j.jvcir.2010.12.005 ⇑ Corresponding author. Fax: +1 435 7973265. E-mail address: [email protected] (X. Qi). This paper presents a novel semi-fragile watermarking scheme for image content authentication with tampering localization. The proposed scheme uses a non-traditional quantization method to modify one chosen approximation coeff...
متن کاملSecure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
In this paper, we present a new fragile watermarking method aimed at providing improved tampering localisation and self-recovery capabilities. First, a secure blockwise mechanism, resilient to cropping, is used to localise distorted blocks of pixels. Subsequently, the tampering localisation accuracy is refined by means of an iterative pixel-wise mechanism, which estimates the original watermark...
متن کامل