Skip to main content
Log in

Improved Reversible Image Authentication Scheme

  • Published:
Cognitive Computation Aims and scope Submit manuscript

Abstract

Image integrity authentication has aroused concerns because of the frequent modification on images. However, most of the image authentication schemes proposed so far employed the irreversible data hiding approach and the results of the published few reversible authentication methods are not satisfactory. To improve the detection accuracy as well as marked image quality, this paper proposes an improved reversible image authentication method based on Hilbert Curve mapping. In the proposed method, pixels are first mapped to a one-dimensional vector by using Hilbert Curve and divided into non-overlapping sets. Then, authentication codes can be embedded into each set by reversible data hiding approach. After comparing the extracted bits with the original authentication codes, the image set could be taken as modified one or unmodified one. Because image redundancy can be explored more fully and more flexibly by adopting Hilbert Curve mapping, more authentication codes can be embedded into the host image while leaving less distortion. Thus, both the detection accuracy and the marked image quality can be improved. The experimental results demonstrate the improvement compared with the latest development of reversible image authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Lou DC, Liu JL. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron. 2000;46(1):31–9.

    Article  Google Scholar 

  2. Tsai PY, Hu YC, Chang CC. A novel image authentication scheme based on quadtree segmentation. Imaging Sci J. 2005;53(3):149–62.

    Article  Google Scholar 

  3. Ababneh S, Ansari R, Khokhar A. Iterative compensation schemes for multimedia content authentication. J Vis Commun Image Represent. 2009;20(5):303–11.

    Article  Google Scholar 

  4. Lin CY, Chang SF. A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol. 2001;11(2):153–68.

    Article  Google Scholar 

  5. Zhang XP, Qian ZX, Ren YL, Feng GR. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forens Secur. 2011;6(4):1223–32.

    Article  Google Scholar 

  6. Qin C, Chang CC, Chen PY. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 2012;92(4):1137–50.

    Article  Google Scholar 

  7. Lo CC, Hu YC. A novel reversible image authentication scheme for digital images. Signal Process. 2014;98:174–85.

    Article  Google Scholar 

  8. Xia Z, Wang X, Sun X, Wang B. Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw. 2014;7(8):1283–91.

    Article  Google Scholar 

  9. Xia Z, Wang X, Sun X, Liu Q, Xiong N. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl. 2016;75(4):1947–62.

    Article  Google Scholar 

  10. Yin ZX, Tang J, Liu YJ, Luo B. Data hiding algorithm with high payload based on pixel pair matching. Syst Eng Theory Pract. 2013;33(11):2972–9.

    Google Scholar 

  11. Hong W, Chen TS. A novel data embedding method using adaptive pixel pair matching. IEEE Trans Image Process. 2012;7(1):176–84.

    Google Scholar 

  12. Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Trans Circuits Syst Video Technol. 2006;16(3):354–62.

    Article  Google Scholar 

  13. Tsai PY, Hu YC, Yeh HL. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 2009;89(6):1129–43.

    Article  Google Scholar 

  14. Li X, Li J, Li B, Yang B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013;93:198–205.

    Article  Google Scholar 

  15. Peng F, Li X, Yang B. Improved PVO-based reversible data hiding. Digit Signal Process. 2014;25:255–65.

    Article  Google Scholar 

  16. Wang X, Ding J, Pei QQ. A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci. 2015;310:16–35.

    Article  Google Scholar 

  17. Qu XC, Kim HJ. Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 2015;111:249–60.

    Article  Google Scholar 

  18. Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890–6.

    Article  Google Scholar 

  19. Li X, Zhang W, Gui X, Yang B. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forens Secur. 2013;8(7):1091–100.

    Article  Google Scholar 

  20. Qian Z, Zhang X. Reversible data hiding in encrypted image with distributed source encoding. IEEE Trans Circuits Syst Video. 2015. doi:10.1109/TCSVT.2015.2418611.

    Google Scholar 

Download references

Funding

This study was funded by National Natural Science Foundation of China (Grant Number 61502009 and 61472002), Anhui Provincial Natural Science Foundation (Grant Number 1508085SQF216), Key Program for Excellent Young Talents in Colleges and Universities of Anhui Province (Grant Number gxyqZD2016011), Large-scale Application Demonstration of the Education Cloud (Grant Number 2013BAH72B03) and funds of PADA & CICAEET.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Luo.

Ethics declarations

Conflict of interest

Zhaoxia Yin, Xuejing Niu, Zhili Zhou, Jin Tang, and Bin Luo declare that they have no conflict of interest.

Informed Consent

All procedures followed were in accordance with the ethical standards of the responsible committee on human experimentation (institutional and national) and with the Helsinki Declaration of 1975, as revised in 2008 (5). Additional informed consent was obtained from all patients for which identifying information is included in this article.

Human and Animal Rights

This article does not contain any studies with human or animal subjects performed by the any of the authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, Z., Niu, X., Zhou, Z. et al. Improved Reversible Image Authentication Scheme. Cogn Comput 8, 890–899 (2016). https://doi.org/10.1007/s12559-016-9408-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12559-016-9408-6

Keywords

Navigation