Abstract
In this paper, we proposed an image authentication method based on least significant bit (LSB) hiding and double random phase encoding (DRPE) technique. An image that needs to be authenticated is first encrypted using DRPE algorithm. All amplitude information in this encrypted image is discarded and the phase mask is reserved. Then, the phase image is converted into a binary image by setting phase values less than zero as zero and other values as one. The binary image is hided in a host image with the LSB hiding approach. The recipient extracts the hiding binary image from the host image and then sets the zero-values as \( { - \pi } \) and one-values as \( \uppi \). Finally, the retrieved phase mask is decrypted and authenticated using DRPE and non-linear cross correlation algorithm, respectively. The proposed authentication scheme can provide another layer of security because the retrieved phase mask cannot reveal any original image information. Furthermore, the decrypted image from phase mask cannot be visually recognized with naked eyes which can distract the attention of attackers. Experimental results have shown the feasibility of the proposed authentication algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ghoshal, N., Mandal, J.K.: Image authentication technique in frequency domain based on discrete Fourier transformation (IATFDDFT). arXiv preprint arXiv:1212.3371 (2012)
Bartolini, F., et al.: Image authentication techniques for surveillance applications. Proc. IEEE 89, 1403–1418 (2011)
Petitcolas, F., Ross, J.A., Markus, G.K.: Information hiding-a survey. Proc. IEEE 87, 1062–1078 (1999)
Champakamala, N., Padmini, K., Radhika, D.K.: Least significant bit algorithm for image steganography. Int. J. Adv. Comput. Technol. 3, 3–38 (2013)
Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 6, 218932 (2002)
Gupta, S., Ankur, G., Bharat, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Modern Educ. Comput. Sci. 4, 27 (2012)
Asad, M., Gilani, J., Khalid, A.: An enhanced least significant bit modification technique for audio steganography. In: International Conference on Computer Networks and Information Technology (ICCNIT). IEEE (2011)
Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)
Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)
Yi, F., Moon, I., Lee, Y.H.: A multispectral photon-counting double random phase encoding scheme for image authentication. Sensors 14, 8877–8894 (2014)
Moon, I., et al.: Avalanche and bit independence characteristics of double random phase encoding in the Fourier and Fresnel domains. JOSA A 31, 110–1111 (2014)
Lee, J., et al.: Graphics processing unit–accelerated double random phase encoding for fast image encryption. Opt. Eng. 53, 112308 (2014)
Moon, I., et al.: Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. Appl. Opt. 55, 4328–4335 (2016)
Javidi, B.: Nonlinear joint power spectrum based optical correlation. Appl. Opt. 28, 2358–2367 (1989)
Yi, F.: Photon-counting double-random-phase image authentication in the Fresnel domain. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10040, pp. 487–497. Springer, Cham (2016). doi:10.1007/978-3-319-48674-1_43
Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25, 887–889 (2000)
Li, H., Wang, Y.: Double-image encryption based on iterative gyrator transform. Opt. Commun. 281, 5745–5749 (2008)
Pérez-Cabré, E., Cho, M., Javidi, B.: Information authentication using photon-counting double-random-phase encrypted images. Opt. Lett. 36, 22–24 (2011)
Cho, M., Javidi, B.: Three-dimensional photon counting double-random-phase encryption. Opt. Lett. 38, 3198–3201 (2013)
Chen, Y., et al.: An improved watermarking method based on double random phase encoding technique. Opt. Laser Technol. 42, 617–623 (2010)
Sheng, Y., et al.: Information hiding based on double random-phase encoding and public-key cryptography. Opt. Express 17, 3270–3284 (2009)
Cai, L., et al.: Digital image encryption and watermarking by phase-shifting interferometry. Appl. Opt. 43, 3078–3084 (2004)
Chen, W., Chen, X.: Double random phase encoding using phase reservation and compression. J. Opt. 16, 025402 (2014)
Chen, W., et al.: Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photonics J. 5, 6900113 (2013)
Chan, C., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004)
Fillatre, L.: Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Signal Process. 60, 556–569 (2012)
Xia, Z., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)
Yuan, C., Sun, X., Lv, R.: Fingerprint liveness detection based on multi-scale LPQ and PCA. China Commun. 13, 60–65 (2016)
Wan, J., et al.: Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools Appl. 1–7 (2016)
Huang, L., et al.: AutoODC: automated generation of orthogonal defect classifications. Autom. Softw. Eng. 22, 3–46 (2015)
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2015R1A2A1A10052566).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yi, F., Jeoung, Y., Geng, R., Moon, I. (2017). Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)