Image Content Authentication and Self-recovery Using Rehashing and Matrix Combined Method

  • Xue-Jing Li
  • Wan-Li LyuEmail author
  • Jie Xie
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 634)


Numerous image content authentication schemes have been proposed to solve potential security problems in transmitting digital images via the Internet. Aiming at achieving high detection successful rates in image tamper areas localization, a novel image content authentication and self-recovery algorithm using rehashing model and reference matrix \( {\text{M}} \) is proposed in this study. A series of hash functions compose a rehashing model for the sake of avoiding numerous collisions of the random authentication numbers in the procedure of image tamper detection. This scheme utilize the rehashing authentication information as the digital watermark to be embedded into the original image by means of the reference matrix \( \varvec{M} \), in order to authenticate the integrity of the received image. The experiment results demonstrate that the proposed method can detect tamper areas more accurately and recover image tamper content nearly up to 50 % with an acceptable visual quality.


Content authentication Image self-recovery Rehashing model Digital watermarking 



This research work is supported by Provincial Training Projects of Innovation and Entrepreneurship for Undergraduates of Anhui University under Grant No.J1018515315.


  1. 1.
    Lin, C.Y., Chang, S.F.: SARI: Self-authentication-and-recovery image watermarking system. In: Proceedings of the Ninth ACM International Conference on Multimedia, pp. 628–629. ACM (2001)Google Scholar
  2. 2.
    Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)CrossRefGoogle Scholar
  4. 4.
    Chang, C.C., Fan, Y.H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 41(2), 654–661 (2008)CrossRefzbMATHGoogle Scholar
  5. 5.
    Tong, X., Liu, Y., Zhang, M., Chen, Y.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Sig. Process. Image Commun. 28(3), 301–308 (2012)CrossRefGoogle Scholar
  6. 6.
    Lee, C.W., Tsai, W.H.: A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding. Sig. Process. 93(7), 2010–2025 (2013)CrossRefGoogle Scholar
  7. 7.
    Tagliasacchi, M., Valenzise, G., Tubaro, S.: Hash-based identification of sparse image tampering. IEEE Trans. Image Process. 18(11), 2491–2504 (2009)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Ahmed, F., Siyal, M.Y., Uddin Abbas, V.: A secure and robust hash-based scheme for image authentication. Sig. Process. 90(5), 1456–1470 (2010)CrossRefzbMATHGoogle Scholar
  9. 9.
    Lei, Y., Wang, Y., Huang, J.: Robust image hash in radon transform domain for authentication. Sig. Process. Image Commun. 26(6), 280–288 (2011)CrossRefGoogle Scholar
  10. 10.
    Sprugnoli, R.: Perfect hashing functions: a single probe retrieving method for static sets. Commun. ACM 20(11), 841–850 (1977)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Du, M.W., Hsieh, T.M., Jea, K.F.: The study of a new perfect hash scheme. IEEE Trans. Softw. Eng. SE-9(3), 305–313 (1983)CrossRefzbMATHGoogle Scholar
  12. 12.
    Kim, K.S., Lee, M.J., Lee, J.W., Oh, T.W., Lee, H.Y.: Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging. Comput. Vis. Image Underst. 115(9), 1308–1323 (2011)CrossRefGoogle Scholar
  13. 13.
    He, H., Chen, F., Tai, H.M., Kalker, T., Zhang, J.: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. Inf. Forensics Secur. 7(1), 185–196 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Authors and Affiliations

  1. 1.Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and TechnologyAnhui UniversityHefeiChina

Personalised recommendations