Quantization-based image authentication scheme using QR error correction
Tóm tắt
Image authentication, which is provided with capabilities of tamper detection and data recovery, is an efficient way to protect the contents of digital images. Vector quantization (VQ) is a data compression method. A VQ-compressed code is not only a significant image authentication feature but also applicable in restoring possibly damaged pixels. However, if an image is tampered with, the necessary recovery information disappears. To solve this problem, this paper proposes a quantization-based image authentication scheme using two-dimensional (2D) barcodes to protect important features. Compared with older linear barcodes, 2D barcodes are a machine-readable representation of binary data that possess capabilities of location and tolerance. This paper presents a method for incorporating VQ-compressed code into 2D barcodes and embedding those barcodes into the image itself. Experimental results showed that VQ codes can be completely reserved during data recovery even though quick response codes sustain certain perceptible distortions. Moreover, the proposed scheme provided higher quality authenticated and recovered images compared with previous methods.
Tài liệu tham khảo
I.C. Shen, W.H. Cheng, Gestalt rule feature points. IEEE Trans. Multimedia 17(4), 526–537 (2015).
K.E.A. van de Sande, T. Gevers, C.G.M. Snoek, Evaluation of color descriptors for object and scene recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(9), 1582–1596 (2010).
C.Y. Lin, W.W. Chang, Y.C. Chou, Bidirectional background modeling for video surveillance. J. Electron. Sci. Technol. 10(3), 232–237 (2012).
H.Y. Chi, W.H. Cheng, C.W. You, M.S. Chen, What catches your eyes as you move around? On the discovery of interesting regions in the street., Proceedings of International Conference on Multimedia Modeling, (Miami, 2016), p. 4–6
T.H. Tsai, W.C. Jhou, W.H. Cheng, M.C. Hu, I.C. Shen, T. Lim, K.L. Hua, A. Ghoneim, M.A. Hossain, S.C. Hidayati, Photo sundial: estimating the time of capture in consumer photos. Neurocomputing 177, 529–542 (2016).
F. Ahmed, I.S. Moskowitz, Correlation-based watermarking method for image authentication applications. Opt. Eng. 43(8), 1833–1838 (2004).
S. Jothimani, P. Betty, A survey on image authentication techniques. Int. J. Eng. Trends Technol. 7(4), 184–186 (2014).
W.C. Wu and G.R. Ren, A new approach to image authentication using chaotic map and sudoku puzzle. Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (Kyoto Japan), 628–631 (2009)
C.S. Chan, An image authentication method by applying hamming code. Pattern Recogn. Lett. 32(14), 1679–1690 (2011)
J.H. Chen, C.H. Chen, Image tamper detection scheme using QR Code and DCT transform techniques. Int. J. Comput. Consum. Control 1(2), 61–68 (2012)
J.C. Chuang, Y.C. Hu, C.C. Lo, W.L. Chen, Grayscale image tamper detection and recovery based on vector quantization. Int. J. Secur. Appl. 7(6), 209–228 (2013)
W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)
W.C. Wu and Y.P. Hsieh, Quantization- and prediction-based image authentication and recovery. Proceedings of the 5th International Conference on Genetic and Evolutionary Computing, (Kinmen Taiwan), 188–191 (2011)
C.M. Wu, Y.C. Hu, K.Y. Liu, J.C. Chuang, A novel active image authentication scheme for block truncation coding. Int. J. Signal Process. Image Process. Pattern Recognit 7(5), 13–26 (2014)
W.C. Wu and Z.W. Lin, An image content protection and tampering localization scheme using singular values. Proceedings of the 3rd International Scientific Conference on Engineering and Applied Sciences, (Okinawa Japan), 238–247 (2015)
P.W. Wong, N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)
S.S. Wang, S.L. Tsai, Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn. 41(2), 701–712 (2008)
C.W. Yang, J.J. Shen, Recover the tampered image based on VQ indexing. Signal Process. 90(1), 331–343 (2010)
S. Amtullah, A. Koul, Passive image forensic method to detect copy move forgery in digital images. J. Comput. Eng. 16(2), 96–104 (2014)
Y.L. Chen, C.T. Hsu, Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans. Inf. Forensics Secur. 6(2), 396–406 (2011)
W. Luo, Z.H. Qu, F. Pan, J. Huang, A survey of passive technology for digital images forensics. Front. Comput. Sci. China 1, 166–179 (2007)
K.H. Pandya, H.J. Galiyawala, A survey on QR codes: in context of research and application. Int. J. Emerg. Technol. Adv. Eng. 4(3), 258–262 (2014)
Y. Linde, A. Buzo, R.M. Gray, An algorithm for vector quantizer design. IEEE Trans. Commun. 28(1), 84–95 (1980)
C. Karri, U. Jena, Fast vector quantization using a bat algorithm for image compression. J. Eng. Sci. Technol. 19(2), 769–781 (2016)