×

An efficient image authentication method based on Hamming code. (English) Zbl 1118.68134

Summary: Image authentication has come through a history of several years. However, up to the present time, most mainstream image authentication schemes are still unable to detect burst bit errors. Moreover, the capability of recovering tampered pixels in detail (complex) areas has not been very satisfactory either. In this paper, we offer to combine the Hamming code technique, Torus automorphism and bit rotation technique to do tamper proofing. According to our experimental results, our new hybrid method can effectively eliminate burst bit errors, and our recovered pixels in detail areas can actually gain very high clarity. The results show that our scheme is quite a practical method, which is quite able to detect and recover tampered areas.

MSC:

68T10 Pattern recognition, speech recognition
68U10 Computing methodologies for image processing
Full Text: DOI

References:

[1] Chang, C. C.; Chan, C. S., A watermarking scheme based on principal component analysis technique, Informatica, 14, 4, 431-444 (2003) · Zbl 1084.68930
[2] Hwang, M. S.; Chang, C. C.; Hwang, K. F., Digital watermarking of images using neural networks, J. Electron. Imaging, 9, 4, 548-555 (2000)
[3] Kim, Y. W.; Oh, I. S., Watermarking text document images using edge direction histograms, Pattern Recognition Lett., 25, 11, 1243-1251 (2004)
[4] Shih, F. Y.; Wu, S. Y.T., Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, 36, 4, 969-975 (2003)
[5] Tsai, P. Y.; Hu, Y. C.; Chang, C. C., A color image watermarking scheme based on color quantization, Signal Process., 84, 4, 95-106 (2004) · Zbl 1145.94474
[6] Wu, Y. T.; Shih, Y. F., An adjusted-purpose digital watermarking technique, Pattern Recognition, 37, 12, 2349-2359 (2004)
[7] Celik, M. U.; Sharmar, G.; Tekalp, A. M., Hierarchical watermarking for secure image authentication with localization, IEEE Trans. Image Process., 11, 6, 585-594 (2002)
[8] Lin, C. Y.; Chang, S. F., A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Trans. Circuits Syst. Video Technol., 11, 2, 153-168 (2001)
[9] Lou, D. C.; Liu, J. L., Fault resilient and compression tolerant digital signature for image authentication, IEEE Trans. Consumer Electron., 46, 1, 31-39 (2000)
[10] Lu, C. S.; Liao, H. Y., Structural digital signature for image authentication: an incidental distortion resistant scheme, IEEE Trans. Multimedia, 5, 2, 161-173 (2003)
[11] Tsai, P. Y.; Hu, Y. C.; Chang, C. C., Using set partitioning in hierarchical trees to authenticate digital image, Signal Process.: Image Commun. J., 18, 813-822 (2003)
[12] Wong, P. W.; Memon, N., Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process., 10, 10, 1593-1601 (2001) · Zbl 1039.68802
[13] Hamming, R. W., Error detecting and error correcting codes, Bell Syst. Tech. J., 26, 2, 147-160 (1950) · Zbl 1402.94084
[14] G. Voyatzis, I. Pitas, Chaotic mixing of digital images and applications to watermarking, Proceedings of European Conference on Multimedia Applications, vol. 2, 1996, pp. 687-695.; G. Voyatzis, I. Pitas, Chaotic mixing of digital images and applications to watermarking, Proceedings of European Conference on Multimedia Applications, vol. 2, 1996, pp. 687-695.
[15] Serra, J., Image Analysis and Mathematical Morphology (1982), Academic Press: Academic Press New York · Zbl 0565.92001
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.