Zhang Xiao-hua, Liu Fang, Jiao Li-cheng . Effective Image Authentication Algorithm Based on Image Halftone Technique[J]. Journal of Electronics & Information Technology, 2004, 26(5): 685-689.
Citation:
Zhang Xiao-hua, Liu Fang, Jiao Li-cheng . Effective Image Authentication Algorithm Based on Image Halftone Technique[J]. Journal of Electronics & Information Technology, 2004, 26(5): 685-689.
Zhang Xiao-hua, Liu Fang, Jiao Li-cheng . Effective Image Authentication Algorithm Based on Image Halftone Technique[J]. Journal of Electronics & Information Technology, 2004, 26(5): 685-689.
Citation:
Zhang Xiao-hua, Liu Fang, Jiao Li-cheng . Effective Image Authentication Algorithm Based on Image Halftone Technique[J]. Journal of Electronics & Information Technology, 2004, 26(5): 685-689.
Based on the image halftone technique, a new effective image authentication algorithm is proposed with self repairing ability. First, the original image is quantized by 4 bit based 011 the error diffusion image halftone, and then the result is permuted by chaos operator, at the same time the halftone color set is constructed with the least quantization error. Next, the permuted image is hidden into the original image based on the error diffusion watermark algorithm. When the watermarked image is received, to verify the authenticity of the received image, the hidden information is extracted out from the received image and permuted inversely. If the received image is similar to the extracted information, the received image is creditable, else that is to say, there exists a local region that is dissimilarity, i.e. the region is tampered, according to corresponding region of extracted information, the tampered region is repaired. Finally, experimental result to demonstrate the effectiveness of the proposed image authentication technique is presented.
Queluz M P. Content-based integrity protection of digital images. in SPIE Conf., Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, 3657: 85-93.[2]Fridrich J. Image watermarking for tamper detection. in Proc. IEEE Int. Conf. Image Processing,Chicago, IL, Oct. 1998: 404-408.[3]Bhattacharjee S, Kutter M. Compression tolerant image authentication. in Proc. IEEE Int.Conf. Image Processing, Chicago, IL, Oct. 1998: 435-439.[4]Ching-Yung Lin. A robust image authentication method distinguishing JPEG compression from Malicious Manipulation[J].IEEE Trans. on Circuits and System of Video Technology.2001, 11(2):153-168[5]Murat Mese, vaidyanathan P P. Pecent advance in digital halftoning and inverse halftoning methods. IEEE Trans. on CAS, 2001, 49(6): 790-805.