• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

Vol. 10, No. 1, January 30, 2016
10.3837/tiis.2016.01.023, Download Paper (Free):

Abstract

Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
T. Nguyen, C. Chang and T. Shih, "A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images," KSII Transactions on Internet and Information Systems, vol. 10, no. 1, pp. 395-413, 2016. DOI: 10.3837/tiis.2016.01.023.

[ACM Style]
Thai-Son Nguyen, Chin-Chen Chang, and Tso-Hsien Shih. 2016. A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images. KSII Transactions on Internet and Information Systems, 10, 1, (2016), 395-413. DOI: 10.3837/tiis.2016.01.023.