A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection
Abstract
Digital forensics is a multi-disciplinary structure that is standardized on the collection, storage, compilation and analysis of evidence, usually obtained as data, through information systems. Digital forensics is not contrary to what is supposed to be a special field, it is a wide field discipline. In this article, a new fragile watermarking method is presented instead of cryptographic hash functions which are frequently used in digital forensics applications. The hash functions cannot detect the region where the attack is made, so we proposed fragile watermarking for authentication in digital data. The best way to make a fragile watermark is to use secret sharing algorithms. In this article, authentication and tamper detection for RGB images are performed using Wu and Chen's visual secret sharing algorithm. The proposed fragile watermarking algorithm is an algorithm with high visual quality, fragile, reliable and high data hiding capacity. Owing to Wu and Chen’s visual secret sharing algorithm, a new fragile watermarking method that is sensitive to angular attacks is proposed.
Keywords
Kaynakça
- [1] Z. Ni, Y.-Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, IEEE Transactions On Circuits And Systems For Video Technology, 16 (3), 2006.
- [2] M. B. Begum, Y. Venkataramani, LSB Based Audio Steganography Based On Text Compression, Procedia Engineering, 30, 703-710, 2012.
- [3] F. Perez-Gonzlez F. Balado, Quantized projection data hiding, inProc. IEEE Int. Conf. Image Process., 2, 889–892, 2002.
- [4] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, Lossless data hiding: fundamentals, algorithms and applications, IEEE Int. Symp. Circuits Syst., 33–36, 2004.
- [5] Q. Mao, A fast algorithm for matrix embedding steganography, Digital Signal Processing, 25, 248-254, 2014.
- [6] L. Von Ahn and N. J. Hopper, Public-key steganography, in Advances in Cryptology-Eurocrypt, Berlin, Germany: Springer-Verlag, 3027, 323–341, 2004.
- [7] G.S. Lin, Y.T. Chang, W.N. Lie, A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm, IEEE Trans. Multimedia, 12 (5), 345–357, 2010.
- [8] C. Cachin, An information-theoretic model for steganography, Information and Computation, 192 (1), 41-56, 2004.
- [9] Y.-H. Yu, C.-C. Chang, A new edge detection approach based on image context analysis, Image and Vision Computing, 24 (10), 1090–1102, 2006.
- [10] A. Westfeld, Detecting low embedding rates, In: Proceedings of information hiding workshop. LNCS, 2578, 324-339., 2003.