193
Views
5
CrossRef citations to date
0
Altmetric
Original Article

A secure image authentication scheme for tamper detection and recovery

, &
Pages 219-233 | Accepted 10 May 2011, Published online: 12 Nov 2013

REFERENCES

  • Barreto PSLM, Kim HY, Rijmen V. Toward a secure public-key blockwise fragile authentication watermarking, Proc. Int. Conf. on Image processing: ICIP 2001, Thessaloniki, Greece, October2001, IEEE, Vol. 149, pp. 494–497.
  • Chang CC, Fan YH, Tai WL. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Patt. Recogn., 2008, 41, 654–661.
  • Chang CC, Hu YS, Lu TC. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett., 2006, 27, 439–446.
  • Chang CC, Lin PY, Chuang JC. Fragile watermarking scheme for digital image authentication using pixel difference. Imag. Sci. J., 2007, 55, 140–147.
  • Feng JB, Lin IC, Tsai CS, Chu YP. Reversible watermarking: current status and key issues. Int. J. Network Secur., 2006, 2, 161–171.
  • Fridrich J, Goljan M, Memon N. Further attacks on Yeung-Mintzer fragile watermarking scheme. Proc. SPIE, 2000, 3971, 428–437.
  • Voyatzis G, Pitas I. Protecting digital-image copyrights: a framework. IEEE Comput. Graph. Appl., 1999, 1, 18–24.
  • Gonzalez RC, Woods RE. Digital Image Processing, 2008, 3rd edition (Prentice Hall, New York).
  • Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process., 2000, 9, 432–441.
  • Kang X, Huang J, Shi YQ, Lin Y. A DWT–DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 776–786.
  • Kang X, Zeng W, Huang J. A multi-band wavelet watermarking scheme. Int. J. Network Secur., 2008, 6, 121–126.
  • Lee TY, Lin SD. Dual watermark for tamper detection and recovery. Patt. Recogn., 2008, 41, 3497–3506.
  • Lin PL, Hsieh CK, Huang PW. A hierarchical digital watermarking method for image tamper detection and recovery. Patt. Recogn., 2005, 38, 2519–2529.
  • Lu CS, Liao H.-YM. Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process., 2001, 10, 1579–1592.
  • Lu H, Shen R, Chung FL. Fragile watermarking scheme for image authentication. Electron. Lett., 2003, 39, 898–900.
  • Lu HC, Chu YP, Hwang MS. New steganographic method of pixel value differencing. J. Imag. Sci. Technol., 2006, 50, 424–426.
  • Lu ZM, Liu CH, Wang H. Image retrieval and content integrity verification based on multipurpose image watermarking scheme. Int. J. Innov. Comput. Inf. Control, 2007, 3, 621–630.
  • NIST. Secure Hash Standard [online], 2002 (Gaithersburg, MD, NIST). [accessed 1 March 2010]. Available at: <http://csrc.nist.gov/publications/fips>
  • NIST. The Keyed-hash Message Authentication Code (HMAC) [online], 2008 (Gaithersburg, MD, NIST). [accessed 1 March 2010]. Available at: <http://csrc.nist.gov/publications/fips>
  • O’Ruanaidh JJK, Dowling WJ, Boland FM. Watermarking digital images for copyright protection. IEE Proc. Image Signal Process., 1996, 143, 250–256.
  • Park Y, Kang H, Yamahuchi K, Kobayashi K. Watermarking for tamper detection and recovery. IEICE Electron. Express, 2008, 5, 689–696.
  • Pereira S, Pun T. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process., 2000, 9, 1123–1129.
  • Pfitzmann B. Information hiding terminology. Lect. Notes Comput. Sci., 1996, 1174, 347–350.
  • Rey C, Dugelay JL. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process., 2002, 613–621.
  • Shen JJ, Hsu PW. A fragile associative watermarking on 2D barcode for data authentication. Int. J. Network Secur., 2008, 7, 301–309.
  • Stallings W. Cryptography and Network Security, 2006, 4th edition (Prentice Hall, Englewood Cliffs, NJ).
  • Suthaharan S, Sathananthan S. Transform domain technique: robust watermarking for digital images, Proc. IEEE Southeastcon 2000 Conf., Nashville, TN, USA, April 2000, IEEE, pp. 407–412.
  • Wang CW, Wu NI, Tsai CS, Hwang MS. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
  • Wang MS, Chen. W. C. A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput. Stand. Interfaces, 2007, 29, 561–570.
  • Wang RZ, Lin CF, Lin JC. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
  • Weber A. The USC-SIPI Image Database, 1977, (Los Angeles, CA, The Signal and Image Processing Institute of the University of Southern California). [accessed 1 Jan 2010]. Available at: <http://sipi.usc.edu/database/>
  • Wu CC, Hwang MS, Kao SJ. A new approach to the secret image sharing with steganography and authentication. Imag. Sci. J., 2009, 57, 140–151.
  • Wu NI, Wang CM, Tsai CS, Hwang MS. A certificate-based watermarking scheme for coloured images. Imag. Sci. J., 2008, 56, 326–332.
  • Yoo KS, Lee WH. Classification-based image watermarking using wavelet DC components. Imag. Sci. J., 2010, 58, 105–111.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.