A new data hiding scheme for binary image authentication with small image distortion

被引:36
作者
Lee, Younho [2 ]
Kim, Heeyoul [1 ]
Park, Yongsu [3 ]
机构
[1] Kyonggi Univ, Dept Comp Sci, Suwon, South Korea
[2] Yeungnam Univ, Dept Informat & Commun Engn, Taegu, South Korea
[3] Hanyang Univ, Coll Informat & Commun, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Security; Information hiding; Image authentication; Digital watermarking; Authentication codes; STEGANOGRAPHY; WATERMARKING; SECURITY;
D O I
10.1016/j.ins.2009.07.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new data hiding scheme for binary image authentication that has a small distortion of the cover image is proposed in this paper. Using the data-embedding algorithm that is based on Hamming codes, the proposed scheme embeds authentication information into the cover image with flipping only a small number of pixels. A special type of the pixels are selected and flipped by a new algorithm to minimize visual distortion. This new algorithm is based on ELSSM (Edge Line Segment Similarity Measure). Randomly shuffling the bit-order of the authentication information to be embedded, the information can only be extracted by the designated receiver who has the symmetric key. We employ two measurement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the feasibility of the proposed scheme. Using these metrics, we analyze the proposed scheme and the previous schemes. The analysis reveals that the proposed scheme requires less image distortion than the previous schemes whilst achieving the same level of the miss detection rate. Experimental results demonstrate that the proposed scheme is more resilient against recent steganalysis attacks than the previous schemes. (c) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:3866 / 3884
页数:19
相关论文
共 32 条
[21]   HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS [J].
LUBY, M ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :373-386
[22]  
Meijer H., 1985, LECT NOTES COMPUTER, V196, P269
[23]  
Myers S, 2001, LECT NOTES COMPUT SC, V2045, P358
[24]  
PAN G, 2002, P IEEE INT C AC SPEE, V4, P3469
[25]   A survey of watermarking algorithms for image authentication [J].
Rey, C ;
Dugelay, JL .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (06) :613-621
[26]   Color image watermark extraction based on support vector machines [J].
Tsai, Hung-Hsu ;
Sun, Duen-Wu .
INFORMATION SCIENCES, 2007, 177 (02) :550-569
[27]   A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement [J].
Tzeng, CH ;
Tsai, WH .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (09) :443-445
[28]   Multiuser-based shadow watermark extraction system [J].
Wang, Feng-Hsing ;
Yen, Kang K. ;
Jain, Lakhmi C. ;
Pan, Jeng-Shyang .
INFORMATION SCIENCES, 2007, 177 (12) :2522-2532
[29]  
Westfeld A., 2001, P 4 INT WORKSHOP INF, V2137, P289
[30]   Handling uneven embedding capacity in binary images: A revisit [J].
Wu, M ;
Fridrich, J ;
Goljan, B ;
Gou, HM .
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 :194-205