Skip to main content
Log in

Abstract

The existing block-wise lossless image authentication algorithms have to sacrifice the precision of locating distortions because many image basic blocks need to be merged to accommodate for the embedded watermark. We proposed a new lossless image authentication algorithm, where firstly the original image is trisected recursively into the basic blocks, secondly, those basic blocks are connected into a candidate expansion list, thirdly, when an authentication block only merges one basic block every time from the candidate expansion list. The experimental results demonstrate that the algorithm is more accurate than the algorithm based on adaptive combinations of image basic blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

References

  • Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. Image Process IEEE Trans 15(4):1042–1049. ISSN:1057-7149. doi10.1109/TIP.2005.863053

  • Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Francisco

    Google Scholar 

  • Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: SPhotonics West 2001-electronic imaging. International Society for Optics and Photonics, pp 197–208

  • Luo JG, Han GQ, Wo Y, Liang P (2011) Lossless image authentication algorithm with dynamic adjustable tamper localization accuracy. J South China Univ Technol 39(7):121–126

    Google Scholar 

  • Luo JG, Han GQ, Wo Y, Li XY (2012) Lossless image authentication algorithm based on adaptive combinations of image basic blocks. J China Inst Commun 33(6):64–72

    Google Scholar 

  • Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. Circuits Syst Video Technol IEEE Trans 16(3):354–362. ISSN:1051-8215. doi:10.1109/TCSVT.2006.869964

  • Signal and Image Processing Institute, University Southern California, Los Angeles. Image database. http://sipi.usc.edu/database/

  • Thodi DM, Rodr™guez JJ (2007) Expansion embedding techniques for reversible watermarking. Image Process IEEE Trans 16(3):721–750. ISSN:1057-7149. doi:10.1109/TCSVT.2009.2017409

  • Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. Circuits Syst Video Technol IEEE Trans 19(6):906–910. ISSN:1051-8215. doi:10.1109/TIP.2006.891046

  • Tian J (2003) Reversible data embedding using a difference expansion. Circuits Syst Video Technol IEEE Trans 13(8):890–896. ISSN:1051-8215. doi:10.1109/TCSVT.2003.815962

  • Weng S, Zhao Y, Pan JS (2007) Reversible watermarking resistant to cropping attack. IET Inf Secur 1(2):91–95. ISSN:1751-8709. doi:10.1049/iet-ifs:20060091

  • Yeo DG, Lee HY (2012) Block-based image authentication algorithm using reversible watermarking. In: Computer science and convergence. Springer Netherlands, pp 703–711

Download references

Acknowledgments

This work is sponsored by Guangdong Agency of Education Grant, 20120202029, through Department of Computer Science at Guangdong AIB Polytechnic College.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Li, R., Huang, Q. et al. Minimized-expansion based lossless image authentication algorithm. J Ambient Intell Human Comput 6, 845–854 (2015). https://doi.org/10.1007/s12652-015-0320-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0320-9

Keywords

Navigation