Abstract
The existing block-wise lossless image authentication algorithms have to sacrifice the precision of locating distortions because many image basic blocks need to be merged to accommodate for the embedded watermark. We proposed a new lossless image authentication algorithm, where firstly the original image is trisected recursively into the basic blocks, secondly, those basic blocks are connected into a candidate expansion list, thirdly, when an authentication block only merges one basic block every time from the candidate expansion list. The experimental results demonstrate that the algorithm is more accurate than the algorithm based on adaptive combinations of image basic blocks.
Similar content being viewed by others
References
Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. Image Process IEEE Trans 15(4):1042–1049. ISSN:1057-7149. doi10.1109/TIP.2005.863053
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Francisco
Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: SPhotonics West 2001-electronic imaging. International Society for Optics and Photonics, pp 197–208
Luo JG, Han GQ, Wo Y, Liang P (2011) Lossless image authentication algorithm with dynamic adjustable tamper localization accuracy. J South China Univ Technol 39(7):121–126
Luo JG, Han GQ, Wo Y, Li XY (2012) Lossless image authentication algorithm based on adaptive combinations of image basic blocks. J China Inst Commun 33(6):64–72
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. Circuits Syst Video Technol IEEE Trans 16(3):354–362. ISSN:1051-8215. doi:10.1109/TCSVT.2006.869964
Signal and Image Processing Institute, University Southern California, Los Angeles. Image database. http://sipi.usc.edu/database/
Thodi DM, Rodr™guez JJ (2007) Expansion embedding techniques for reversible watermarking. Image Process IEEE Trans 16(3):721–750. ISSN:1057-7149. doi:10.1109/TCSVT.2009.2017409
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. Circuits Syst Video Technol IEEE Trans 19(6):906–910. ISSN:1051-8215. doi:10.1109/TIP.2006.891046
Tian J (2003) Reversible data embedding using a difference expansion. Circuits Syst Video Technol IEEE Trans 13(8):890–896. ISSN:1051-8215. doi:10.1109/TCSVT.2003.815962
Weng S, Zhao Y, Pan JS (2007) Reversible watermarking resistant to cropping attack. IET Inf Secur 1(2):91–95. ISSN:1751-8709. doi:10.1049/iet-ifs:20060091
Yeo DG, Lee HY (2012) Block-based image authentication algorithm using reversible watermarking. In: Computer science and convergence. Springer Netherlands, pp 703–711
Acknowledgments
This work is sponsored by Guangdong Agency of Education Grant, 20120202029, through Department of Computer Science at Guangdong AIB Polytechnic College.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, X., Li, R., Huang, Q. et al. Minimized-expansion based lossless image authentication algorithm. J Ambient Intell Human Comput 6, 845–854 (2015). https://doi.org/10.1007/s12652-015-0320-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0320-9