A reversible image authentication scheme based on compressive sensing

2014 ◽  
Vol 74 (18) ◽  
pp. 7729-7752 ◽  
Author(s):  
Di Xiao ◽  
Mimi Deng ◽  
Xinyi Zhu
2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Hua Ren ◽  
Shaozhang Niu ◽  
Haiju Fan ◽  
Ming Li ◽  
Zhen Yue

Double random-phase encoding- (DRPE-) based compressive sensing (CS) systems support image authentication for noisy images. When extending such systems to resource-constrained applications, how to ensure the authentication strength for noisy images becomes challenging. To tackle the issue, an efficient and secure image authentication scheme is presented. The phase information of the plain image is generated using DRPE and quantized into a binary image as the authentication information. Meanwhile, a sparser error matrix generated by the same plain image and vector quantization (VQ) image works as the input of CS. The authentication information and VQ indexes are self-hidden into the quantized measurements to construct the combined image. Then, it is permutated and diffused with the chaotic sequences generated from a modified Henon map. After decryption at the receiver side, the verifier can implement the blind authentication between the noisy decoded image and the reconstructed image. Supported by the detailed numerical simulations and theoretical analyses, the DRPE-CSVQ exhibits more powerful compression and authentication capability than its counterpart.


2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2011 ◽  
Vol 34 (5) ◽  
pp. 1557-1565 ◽  
Author(s):  
Guangjie Liu ◽  
Junwen Wang ◽  
Shiguo Lian ◽  
Zhiquan Wang

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 149515-149526 ◽  
Author(s):  
Chih-Cheng Chen ◽  
Chin-Chen Chang ◽  
Chia-Chen Lin ◽  
Guo-Dong Su

Author(s):  
Mona A. M. Fouad ◽  
Ahmed Mokhtar A. Mansour

Sign in / Sign up

Export Citation Format

Share Document