Journal of Chinese Computer Systems 2014 11 11 Vol 35 No 11 2014 510507 E-mail johnlxy@ 163 com 16 16 19 2% TP391 A 1000-1220 2014 11-2572-06 Lossless Image Authentication Algorithm with Minimal Expansion LI Xiang-yang Department of Computer Science Guangdong AIB Polytechnic College Guangzhou 510507 China Abstract As the existing block-wise lossless image authentication algorithms need to merge a larger image subregion to embed the watermark information and result in the degradation of the precision of locating distortions a novel lossless image authentication algorithm with minimal expansion is proposed In this algorithm an image is splitted adaptively into some authentication blocks which are composed of a number of fine-grained basic blocks A recursive trisection method and adjacent strategies are adopted to connect basic blocks in sequence into a link When the watermark payload can' t be embedded into an authentication block the algorithm tries to merge only one basic block from the basic block link into current authentication block Theoretical analysis shows that the algorithm can adaptively adjust the size of each authentication block according to the image features to optimize the scale and adjacency of the authentication block Experimental results show that compared with other algorithms the authentication block division in the algorithm is finer and the authentication block size reduced by about 19 2% in average the algorithm significantly improves the tamper localization accuracy Key words lossless image authentication minimal expansion mergence candidate extension block list recursive trisection tamper localization 1 ROI 1 5 Celik 6 64 64 Weng 7 32 32 8 2-4 16 16 5-12 2013-09-03 2013-09-11 20120202029 1966 CCF
11 2573 ALIAA 9 10 2 MLIAA 11 I bb LIAA D D LIAA 1 1 I 222 I 221 I 22 I 22 I 21 I 2 S S I = 2* S I 2 = 2 2 * S I 22 = 2 3 * S I 222 LIAA ALIAA Fig 1 1 MLIAA Binary tree representation of authentication blocks LIAA 12 2 ALIAA MLIAA ALIAA LIAA 2 12 ALIAA 2 1 LIAA 11 MLIAA m bb i 1 i m 1 I 1 I 21 I 21 I 221 I 221 I 222 n ab j 1 j n LIAA Fig 2 2 MLIAA Workflow of MLIAA algorithm D D D
2574 2014 1 bb i MLIAA 2 ab j 3 ab j 4 ab j 2 2 4 MLIAA 1 4 Fig 4 2 2 8 linking ways for 2 2 subregion 2 16 16 80 64 3 S 2 2 1 80 64 0 4 5 4 20 I x y bb i u v 0 I X Y b x = Ceil x /u b y = Ceil y /v X = b x u Y = b y v Ceil i i I b x b y bb i 1 i b x b y u v 5 3 Fig 5 Fig 3 3 Representation of recursive trisection 2 2 1 2 1 1 2 2 2 1 3 2 2 5 bb 1 bb 2 bb 3 bb 4 bb 5 bb 6 bb 7 bb 8 bb 9 bb 10 bb 11 bb 12 bb 13 bb 14 bb 15 bb 16 bb 17 bb 18 bb 19 bb 20 Splitting the original image as 5 4 format 2 2 2 5 1 bb 1 ~ bb 10 bb 11 ~ bb 15 bb 16 ~ bb 20 2 bb 1 ~ bb 5 bb 6 ~ bb 10 bb 11 ~ bb 20 MLIAA Ceil b y /3 b y 4 Ceil 4 /3 = 2 1 2 1 1 1 1 1 MLIAA Ceil b x /3 = Ceil 5 / 3 = 2 2 1 80 64
11 2575 1 2 3 4 1 2 P1 3 4 P2 5 P3 P1 P2 P3 P4 P5 P6 1 BIS P7 P8 P9 Table 1 Basic block listin the BIS array 6 Fig 6 6 Recursive trisection for the image 2 2 3 P1 2 2 4 e P1 2 2 12 BIS 12 1 3 BIS 12 4 bb bb 14 1 bb 6 bb 7 bb 2 13 BIS 13 1 3 BIS 13 2 3 bb 13 BIS 1 1 ~ 4 14 BIS 14 1 3 BIS 14 2 2 bb 12 BIS 15 BIS 15 1 3 BIS 15 2 1 bb 11 16 BIS 16 1 4 BIS 16 2 1 bb 16 17 BIS 17 1 4 BIS 17 2 2 bb 17 P2 1 3 18 BIS 18 1 P2 19 BIS 19 1 4 4 BIS 18 2 BIS 19 2 3 4 bb 18 bb 19 20 BIS 20 1 4 BIS 20 2 5 bb 20 BIS 1 5 ~ 8 1 6 7 2 3 8 9 4 P3 bb 5 bb 10 MLIAA 12 ALIAA bb 5 ALIAA 3 1 6 7 2 3 8 9 4 5 10 MLIAA bb 15 bb 10 1 0 BIS 1 11 ~ 15 bb 15 bb 14 bb 13 bb 12 bb 11 bb 16 bb 11 0 bb 16 bb 17 bb 18 bb 19 bb 20 1 BIS BIS 1 BIS 1 1 BIS 1 2 1 bb 1 2 BIS 2 1 2 BIS 2 1 bb 6 3 BIS 3 1 2 BIS 3 2 2 bb 7 4 BIS 4 1 1 BIS 4 2 2 bb 2 5 BIS 5 1 1 BIS 5 2 3 bb 3 6 BIS 6 1 2 BIS 6 2 3 bb 8 7 BIS 7 1 2 BIS 7 2 4 bb 9 8 BIS 8 1 1 BIS 8 2 4 bb 4 9 BIS 9 1 1 BIS 9 2 5 bb 5 10 BIS 10 1 2 BIS 10 2 5 bb 10 11 BIS 11 1 3 BIS 11 2 5 bb 15 2 4 MLIAA 1 2 3 MLIAA ABL ab 1 BIS BIS 1 1 = 1 BIS 1 2 1 = 1 2 i = 1 j = 1 BIS BIS READED 2 1 = 2 BIS 2 2 = 1 3 bb i i BIS bb i ABL
2576 2014 4 bb i 1 READ- MLIAA 34 3 ALIAA 40 9 ED ab j ABL 8 c 32 32 Г-τ i + + j + + 3 0 i + + 3 3 MATLAB MLIAA 12 Г = X Y /λ 1 /2 X Y λ Г Г USC-SIPI 13 3 1 Г τ 12 8 8 16 16 32 32 τ 25 30 35 40 45 50 MLIAA 40 3 ALIAA 42 8 8 d Г τ MLIAA 37 5 ALIAA 46 4 MLIAA 19 2% MLIAA ALIAA Fig 7 7 MLIAA Baboon 512 512 429 387 370 Authentication accuracy for various basic blocks 7 a Plane Г τ 7 b 16 16 8 8 20 ~ 40 16 16 45 8 8 32 32 16 16 32 32 16 16 32 32 MLIAA 16 16 3 2 MILAA ALIAA Fig 9 Examples of authentication blocks of MLIAA 12 MLIAA MLIAA Lena Elaine ALIAA 8 a 8 8 Г-τ 12 ALIAA MLIAA 37 8 ALIAA 55 8 MLIAA ALIAA 8 b 16 16 Г-τ MLIAA Fig 8 8 MLIAA ALIAA Authentication accuracy of MLIAA and ALIAA 16 16 35 13 9 Lena Plane Elaine 265 Г 24 72 26 03 26 62 31 45 9 MLIAA
11 2577 4 7 Weng S W Zhao Y Pan J S Reversible watermarking resistant to MLIAA MLIAA cropping attack J IET Information Security 2007 1 2 91-95 8 Yeo D G Lee H Y Block-based image authentication algorithm u- sing reversible watermarking C In Computer Science and Convergence CSA 2011 and WCC 2011 Proceedings Jeju Korea MLIAA 2012 703-711 9 Tian J Reversible data embedding using a difference expansion J IEEE Transactions on Circuits and Systems for Video Technology MLIAA 2003 13 8 890-896 ALIAA 10 Tai W L Yeh C M Chang C C Reversible data hiding based on MLIAA histogram modification of pixel differences J IEEE Transactions on Circuits and Systems for Video Technology 2009 19 6 906- MATLAB MLIAA 16 910 16 11 Luo Jian-gao Han Guo-qiang Wo Yan et al Lossless image authentication algorithm with dynamic adjustable tamper localization ALIAA 19 2% accuracy J Journal of South China University of Technology References 1 Zeng W Digital watermarking and data hiding technologies and applications C In Proc Int Conf Inf Syst Anal Synth 1998 3 223-229 2 Cox I J Kilian J Leighton T et al Secure spread spectrum watermarking foe multimedta J IEEE Transactions on Image Processing 1997 6 12 1673-1687 3 Huang J Shi Y Q An adaptive image watermarking scheme based on visual masking J Electronics Letters 1998 34 8 748-750 4 Celik M U Shnrma G snber E et a1 Hierarchical watermarking for secure image authentication with localization J IEEE Transactions on Image Processing 2002 11 6 585-595 5 Fridrieh J Goljan M Du R Invertible authentication C Proceedings of Security and Watermarking of Multimedia Contents III San Jose SPIE 2001 197-208 6 Celik M U Sharma G Tekalp A M Lossless watermarking for image authentication a new framework and an implementation J IEEE Transactions on Image Processing 2006 15 4 1042-1049 Natural Science Edition Guangzhou China 2011 39 7 121-126 12 Luo Jian-gao Han Guo-qiang Wo Yan et al Lossless image authentication algorithm based on adaptive combinations of image basic blocks J Journal on Communications Beijing China 2012 33 6 64-72 13 Signal and image processing institute university southern california los angeles image database EB /OL http / /sipi usc edu / database / 11 J 2011 39 7 121-126 12 J 2012 33 6 64-72