Open Access Open Access  Restricted Access Subscription or Fee Access

Embedding of Metadata and Authentication of an Image via the use of PNG Image with Data Integrity

D. Shankari, K. JoiceRani

Abstract


Digital image is a form of preserving important information. Using the advance of digital technologies it is easy to make visually imperceptible modifications to the content of digital images. To ensure the integrity and the authenticity of a digital image is very difficult. A new authentication method based on the secret sharing technique with data integrity for grayscale document images via the use of the portable network graphics (PNG) image. An authentication signal is generated for each block of a grayscale document image which together with the binarized block content is transformed into several shares using the Shamir secret sharing scheme. The shares are embedded into an alpha channel plane. The alpha channel is combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into range of alpha channel values near their maximum value of 255 to yield a transparent stego image with a disguise effect. In the process of image authentication, image block is marked as tampered if the authentication signal computed the alpha channel plane. The tampered block can be rectified by collecting two shares from unmarked block and apply reverse Shamir secret scheme. With this method the authentication of grayscale document image is effective without the change of the original image.

Keywords


Data Hiding, Secret Sharing, Color Image Authentication, PNG Image.

Full Text:

PDF

References


M. U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Processing, vol.11, no.6, pp.585-595, june.2002.

C. W. Lee and W. H. Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, IEEE Trans. on Image Process. 21 (1) (2012) 207-218.

G. J. Yu, C. S. Lu, and H. Y. M. Liao, Mean quantization-based fragile watermarking for image authentication, Optical Engineering 40 (7) (2001) 1396-1408. 35

Niladri B. Puhan, Anthony T. S. Ho “Binary Document Image Watermarking for Secure Authentication Using Perceptual Modeling” IEEE International Symposium on Signal Processing and Information Technology2005.

J. O. Ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Process. 66 (3) (1998) 303-317.

M. Barni, F. Bartolini and T. Furon, A general framework for robust watermarking security, Signal Process. 83 (10) (2003) 2069-2084.

C. Deng, X. Gao, X. Li and D. Tao, A local Tchebichef moments-based robust image watermarking, Signal Processing, 89 (8) (2009) 1531-1539.

X. Gao, X. Li, D. Tao, C. Deng and J. Li, Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking, IEEE Trans. on Image Process, 21 (8) (2012) 3598-3611.

I. S. Lee and W. H. Tsai, A new approach to covert communication via PDF Files, Signal Process. 90 (2) (2009) 557-565.

T. Y. Liu and W. H. Tsai, A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique, IEEE Transactions on Information Forensics and Security 2 (1) (2007) 24-30, 2007.


Refbacks

  • There are currently no refbacks.