A new data hiding scheme for binary image authentication with small image distortion

被引:36
作者
Lee, Younho [2 ]
Kim, Heeyoul [1 ]
Park, Yongsu [3 ]
机构
[1] Kyonggi Univ, Dept Comp Sci, Suwon, South Korea
[2] Yeungnam Univ, Dept Informat & Commun Engn, Taegu, South Korea
[3] Hanyang Univ, Coll Informat & Commun, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Security; Information hiding; Image authentication; Digital watermarking; Authentication codes; STEGANOGRAPHY; WATERMARKING; SECURITY;
D O I
10.1016/j.ins.2009.07.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new data hiding scheme for binary image authentication that has a small distortion of the cover image is proposed in this paper. Using the data-embedding algorithm that is based on Hamming codes, the proposed scheme embeds authentication information into the cover image with flipping only a small number of pixels. A special type of the pixels are selected and flipped by a new algorithm to minimize visual distortion. This new algorithm is based on ELSSM (Edge Line Segment Similarity Measure). Randomly shuffling the bit-order of the authentication information to be embedded, the information can only be extracted by the designated receiver who has the symmetric key. We employ two measurement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the feasibility of the proposed scheme. Using these metrics, we analyze the proposed scheme and the previous schemes. The analysis reveals that the proposed scheme requires less image distortion than the previous schemes whilst achieving the same level of the miss detection rate. Experimental results demonstrate that the proposed scheme is more resilient against recent steganalysis attacks than the previous schemes. (c) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:3866 / 3884
页数:19
相关论文
共 32 条
[1]   An information-theoretic model for steganography [J].
Cachin, C .
INFORMATION AND COMPUTATION, 2004, 192 (01) :41-56
[2]   Joint coding and embedding techniques for multimedia images [J].
Chang, Chin-Chen ;
Wu, Wen-Chuan ;
Chen, Yi-Hui .
INFORMATION SCIENCES, 2008, 178 (18) :3543-3556
[3]  
CHENG J, 2007, P IEEE INT C AC SPEE, V2, P261
[4]  
CHENG J, 2005, P IEEE INF C IM PROC, V3, P73
[5]   Objective distortion measure for binary text image based on edge line segment similarity [J].
Cheng, Jun ;
Kot, Alex C. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (06) :1691-1695
[6]  
EASTLAKE D, 2006, 4634 IETF RFC
[7]  
*FIPS, 1402 FIPS NIST
[8]  
FRIDRICH J, 2004, IEEE T INF FOREN SEC, V6, P528
[9]   Chaining watermarks for detecting malicious modifications to streaming data [J].
Guo, Huiping ;
Li, Yingjiu ;
Jajodia, Sushil .
INFORMATION SCIENCES, 2007, 177 (01) :281-298
[10]  
Hopper NJ, 2002, LECT NOTES COMPUT SC, V2442, P77