TY - JOUR
T1 - Image authentication scheme based on reversible fragile watermarking with two images
AU - Peng, Yinyin
AU - Niu, Xuejing
AU - Fu, Lei
AU - Yin, Zhaoxia
N1 - Publisher Copyright:
© 2018 Elsevier Ltd
PY - 2018/6
Y1 - 2018/6
N2 - Image authentication receives growing awareness because digital images can be easily modified and the modification is hard to detect. A reversible image authentication method that can improve the accuracy of tamper detection and the quality of watermarking image is presented in this paper. In the proposed method, reversible data hiding is implemented with two identical host images, where the secret information is embedded in one host image while the distortion information is embedded in the other image. In the authentication process, we compared the information extracted from the image with the original authentication information to judge whether the image was tampered with. Experimental results show that the algorithm can improve the accuracy of tamper detection and guarantee the image quality while a large number of authentication information is embedded.
AB - Image authentication receives growing awareness because digital images can be easily modified and the modification is hard to detect. A reversible image authentication method that can improve the accuracy of tamper detection and the quality of watermarking image is presented in this paper. In the proposed method, reversible data hiding is implemented with two identical host images, where the secret information is embedded in one host image while the distortion information is embedded in the other image. In the authentication process, we compared the information extracted from the image with the original authentication information to judge whether the image was tampered with. Experimental results show that the algorithm can improve the accuracy of tamper detection and guarantee the image quality while a large number of authentication information is embedded.
KW - Fragile watermarking
KW - Image authentication
KW - Reversible data hiding
UR - https://www.scopus.com/pages/publications/85047626411
U2 - 10.1016/j.jisa.2018.04.007
DO - 10.1016/j.jisa.2018.04.007
M3 - 文章
AN - SCOPUS:85047626411
SN - 2214-2134
VL - 40
SP - 236
EP - 246
JO - Journal of Information Security and Applications
JF - Journal of Information Security and Applications
ER -