A self-embedding fragile image authentication based on singular value decomposition
- PDF / 4,873,868 Bytes
- 20 Pages / 439.37 x 666.142 pts Page_size
- 23 Downloads / 193 Views
A self-embedding fragile image authentication based on singular value decomposition Jau-Ji Shen 1 & Chin-Feng Lee 2
1
& Fang-Wei Hsu & Somya Agrawal
2
Received: 12 June 2019 / Revised: 16 April 2020 / Accepted: 24 June 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Nowadays, image authentication techniques are widely applied to digital multimedia to address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time applications and therefore, there is a need for the development of more powerful and robust algorithms in order to strengthen their security. In this paper, we proposed a self-embedding fragile image authentication method based on Singular Value Decomposition (SVD). First the original image was divided into non-overlapping blocks and thereafter, each block was further divided into two parts: upper part and bottom part. After block separation, SVD was performed to generate the authentication information for both upper and bottom parts of each block, which were concatenated to generate the authentication code. We performed a series of attacking experiments on the original image to test the robustness of the proposed method. The recovered imperceptibility of the proposed scheme was measured using False Positive Rate (FPR), False Negative Rate (FNR), Peak Signal to Noise Ratio (PSNR), and Structural Similarity (SSIM). It was found that our method not only surpassed previous methods in PSNR but FNR and FPR as well. The experimental results showed an excellent visual imperceptibility against a variety of attacks. The proposed method detected image tampering precisely, and even after massive tampering, it was able to recover the tampered image with high quality. Keywords Image authentication . Fragile watermarking . Singular value decomposition . Selfembedding authentication . Steganography
1 Introduction With the rapid development of Internet and the amount of digital multimedia documents (image, text, audio, and video) growing at an accelerating rate, the development of image processing techniques to stiffen security has become an active research area in recent years [8,
* Chin-Feng Lee [email protected] Extended author information available on the last page of the article
Multimedia Tools and Applications
28]. Authentic multimedia plays a vital role in applications including news reporting, intelligence information gathering, criminal investigation, security surveillance, and health care. Due to various kinds of malicious attacks multimedia documents can easily be duplicated, modified, transformed, and diffused with the aid of editing software [25]. In this paper, we aim to develop an effective image processing technique for image authentication. The image authentication techniques can be classified into two major types. One is cryptography based [1, 22, 27, 35] and the other is watermark based technique [2–7, 9–21, 23, 24, 26, 29–34, 36–40]. The cryptography based authentication technique uses hashing function to calculate the au
Data Loading...