Title :
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability
Author :
Lee, Che-Wei ; Tsai, Wen-Hsiang
Author_Institution :
Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan
Abstract :
A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.
Keywords :
image coding; image colour analysis; message authentication; steganography; Shamir secret sharing scheme; alpha channel plane; authentication signal generation; binarized block content; blind authentication method; data hiding; data repair capability; data security; embedding process; grayscale document image authentication; portable network graphics image; reverse Shamir scheme; transparent stego-image; Authentication; Cryptography; Equations; Gray-scale; Maintenance engineering; Pixel; Data hiding; Portable Network Graphics (PNG) image; data repair; grayscale document image; image authentication; secret sharing; Algorithms; Image Interpretation, Computer-Assisted; Information Storage and Retrieval; Pattern Recognition, Automated; Reproducibility of Results; Security Measures; Sensitivity and Specificity; Signal Processing, Computer-Assisted;
Journal_Title :
Image Processing, IEEE Transactions on
DOI :
10.1109/TIP.2011.2159984