Skip to main content
Log in

A real-time reversible image authentication method using uniform embedding strategy

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Reversible image authentication (RIA) is an emerging research field for image tampering operation detection. Tampered regions can be localized precisely by embedding an authentication code (AC) into each divided image block in advance. Once the image is identified as an authentic image, the original image can be recovered without any loss. Under these two preconditions, an efficient RIA scheme is proposed to further improve the detection precision of the final authentication results. Compared with existing methods, a uniform embedding strategy is adopted in this paper, in which one AC bit is embedded into each divided image block to ensure they have the same authentication capability. To improve the forgery localization precision, the block size is adaptively sought according to the embedding capacity of the image. In addition, during the image authentication process, the embedding parameters and location map information are verified to increase the process’s rigorousness. The experimental results demonstrate the superiority of the detection precision of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Zhou, Z., Wu, Q.M.J., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data (2019). https://doi.org/10.1109/tbdata.2019.2919570)

    Article  Google Scholar 

  2. Qi, L., Wang, R., Li, S., He, Q., Xu, X., Hu, C.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354–364 (2019)

    Article  Google Scholar 

  3. Qi, L., Zhang, X., Dou, W., Hu, C., Yang, C., Chen, J.: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur. Gener. Comp. Syst. 88, 636–643 (2018)

    Article  Google Scholar 

  4. Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017)

    Article  Google Scholar 

  5. Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. 25(3), 36–48 (2018)

    Article  Google Scholar 

  6. Bravo-Solorio, S., Calderon, F., Li, C.T., Nandi, A.K.: Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit. Signal Process. 73, 83–92 (2018)

    Article  MathSciNet  Google Scholar 

  7. Qin, C., Chen, X., Ye, D., Wang, J., Sun, X.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361, 84–99 (2016)

    Article  Google Scholar 

  8. Qin, C., Hu, Y., Yao, H., Duan, X., Gao, L.: Perceptual image hashing based on a Weber local binary pattern and color angle representation. IEEE Access. 7, 45460–45471 (2019)

    Article  Google Scholar 

  9. Tang, Z., Chen, L., Zhang, X., Zhang, S.: Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31(3), 549–560 (2019)

    Article  Google Scholar 

  10. Qiao, T., Shi, R., Luo, X.Y., Xu, M., Zheng, N., Wu, Y.M.: Statistical model-based detector via texture weight map: application in re-sampling authentication. IEEE Trans. Multimed. 21(5), 1077–1092 (2019)

    Article  Google Scholar 

  11. Yao, H., Wang, S.Z., Zhang, X.P., Qin, C., Wang, J.W.: Detecting image splicing based on noise level inconsistency. Multimed. Tools Appl. 76(10), 12457–12479 (2017)

    Article  Google Scholar 

  12. Yao, H., Cao, F., Tang, Z.J., Wang, J.W., Qiao, T.: Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multimed. Tools Appl. 77(14), 18139–18161 (2018)

    Article  Google Scholar 

  13. Wang, J., Li, T., Li, T., Luo, X., Shi, Y.Q., Jha, S.K.: Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE Trans. Circuits Syst. Video Technol. (2018). https://doi.org/10.1109/tcsvt.2018.2867786

    Article  Google Scholar 

  14. Wang, J., Wang, H., Li, J., Luo, X., Shi, Y.Q., Jha, S.K.: Detecting double JPEG compressed color images with the same quantization matrix in spherical coordinate. IEEE Trans. Circuits Syst. Video Technol. (2019). https://doi.org/10.1109/tcsvt.2019.2922309

    Article  Google Scholar 

  15. Iakovidou, C., Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. Vis. Commun. Image Represent. 54, 155–170 (2018)

    Article  Google Scholar 

  16. Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152–163 (2017)

    Article  Google Scholar 

  17. Weng, S.W., Pan, J.S., Li, L.D.: Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding. Inf. Sci. 369, 144–159 (2016)

    Article  Google Scholar 

  18. Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)

    Article  MathSciNet  Google Scholar 

  19. Ou, B., Li, X.L., Wang, J.W., Peng, F.: High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing. 226, 23–34 (2017)

    Article  Google Scholar 

  20. Li, X.L., Zhang, W.M., Gui, X.L., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensic Secur. 10(9), 2016–2027 (2015)

    Article  Google Scholar 

  21. Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)

    Article  Google Scholar 

  22. Dragoi, I.C., Coltuc, D.: Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23(4), 1779–1790 (2014)

    Article  MathSciNet  Google Scholar 

  23. Coltuc, D.: Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21(1), 412–417 (2012)

    Article  MathSciNet  Google Scholar 

  24. Li, X.L., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198–205 (2013)

    Article  Google Scholar 

  25. Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process. 98, 174–185 (2014)

    Article  Google Scholar 

  26. Nguyen, T.S., Chang, C.C., Shih, T.H.: A high-quality reversible image authentication scheme based on adaptive PEE for digital images. KSII Trans. Internet Inf. Syst. 10(1), 395–413 (2016)

    Google Scholar 

  27. Wang, X., Ding, J., Pei, Q.Q.: A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 310, 16–35 (2015)

    Article  Google Scholar 

  28. Yin, Z.X., Niu, X.J., Zhou, Z.L., Tang, J., Luo, B.: Improved reversible image authentication scheme. Cogn. Comput. 8(5), 890–899 (2016)

    Article  Google Scholar 

  29. Hong, W.E., Chen, M.J., Chen, T.S.: An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process. Image Commun. 58, 111–122 (2017)

    Article  Google Scholar 

  30. Peng, F., Li, X.L., Yang, B.: Improved PVO-based reversible data hiding. Digit. Signal Prog. 25, 255–265 (2014)

    Article  Google Scholar 

  31. Gao, G., Cui, Z., Zhou, C.: Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Process. Lett. 25(7), 1099–1103 (2018)

    Article  Google Scholar 

  32. Ou, B., Li, X.L., Wang, J.W.: Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J. Vis. Commun. Image Represent. 38, 328–339 (2016)

    Article  Google Scholar 

  33. Ou, B., Li, X.L., Wang, J.W.: High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 39, 12–23 (2016)

    Article  Google Scholar 

  34. He, W.G., Cai, J., Zhou, K., Xiong, G.Q.: Efficient PVO-based reversible data hiding using multistage blocking and prediction accuracy matrix. J. Vis. Commun. Image Represent. 46, 58–69 (2017)

    Article  Google Scholar 

  35. He, W.G., Xiong, G.Q., Weng, S.W., Cai, Z.C., Wang, Y.M.: Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf. Sci. 467, 784–799 (2018)

    Article  Google Scholar 

  36. Lee, C.F., Shen, J.J., Kao, Y.C., Agrawal, S.: Overlapping pixel value ordering predictor for high-capacity reversible data hiding. J Real-Time Image Proc (2019). https://doi.org/10.1007/s11554-019-00872-z

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank Drs Wien Hong and Zhaoxia Yin for kindly sharing the codes of their works with us. This work was supported in part by the National Natural Science Foundation of China (61702332, 61672354, 61562007) and Guangxi Natural Science Foundation (2017GXNSFAA198222). The authors would like to thank the anonymous reviewers for their valuable suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan Qin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yao, H., Wei, H., Qin, C. et al. A real-time reversible image authentication method using uniform embedding strategy. J Real-Time Image Proc 17, 41–54 (2020). https://doi.org/10.1007/s11554-019-00904-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-019-00904-8

Keywords

Navigation