A Grayscale Image Vulnerability Authentication System Based on Compressed Sensing

Article Preview

Abstract:

In this paper, we study compressed sensing algorithm and image authentication algorithm, present a grayscale image vulnerability authentication system based on compressed sensing. The system extracts the original grayscale image edge information by prewitt algorithm and observes the edge information by compressed sensing algorithm of OMP to generate the observation matrix . Then, the system scrambles the observation matrix by arnold transform algorithm and embeds it into the original grayscale image by singular value decomposition algorithm. We make experiment in order to test the system. The result is shown that the algorithm has good imperceptibility and can resist copying attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

533-537

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J.J. Eggers and B. Girod, Blind watermarking applied to image authentication, in IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt Lake City, UT, May (2001).

DOI: 10.1109/icassp.2001.941335

Google Scholar

[2] R. B. Wolfgang and E. J. Delp, A watermark for digital images, in IEEE International Conference on Image Processing, Lausanne, Switzerland, Sep. (1996).

Google Scholar

[3] C. -Y. Lin and S. -F. Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Transcations on Circuits and Systems for Video Technology, vol. 11, no. 2, p.153–168, Feb. (2001).

DOI: 10.1109/76.905982

Google Scholar

[4] C. -S. Liu and H. -Y. M. Liao, Structural digital signature for image authentication: an incidental distortion resistant scheme, IEEE Transcations on Multimedia, vol. 5, no. 2, p.161–173, June (2003).

DOI: 10.1109/tmm.2003.811621

Google Scholar

[5] W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transcations on Information Theory, vol. IT-22, no. 6, p.644–654, Jan. (1976).

DOI: 10.1109/tit.1976.1055638

Google Scholar

[6] Tedmori, Sara, Al-Najdawi, Nijad. image cryptographic algorithm based on the Haar wavelet transform[J]. information sciences, vol 269, (2014), pp: 21-34.

DOI: 10.1016/j.ins.2014.02.004

Google Scholar

[7] Wang, Qu, Guo, Qing, Lei, Liang. multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg-Saxton algorithm in gyrator domain[J]. optics communications, vol 320, (2014), pp: 12-21.

DOI: 10.1016/j.optcom.2014.01.041

Google Scholar

[8] Wu, Xiangjun, Bai, Chenxi, Kan, Haibin. a new color image cryptosystem via hyperchaos synchronization[J]. communications in nonlinear science and numerical simulation, vol 19, (6), 2014. pp: 1884-1897.

DOI: 10.1016/j.cnsns.2013.10.025

Google Scholar