Skip to main content

Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

Abstract

In this paper, we proposed an image authentication method based on least significant bit (LSB) hiding and double random phase encoding (DRPE) technique. An image that needs to be authenticated is first encrypted using DRPE algorithm. All amplitude information in this encrypted image is discarded and the phase mask is reserved. Then, the phase image is converted into a binary image by setting phase values less than zero as zero and other values as one. The binary image is hided in a host image with the LSB hiding approach. The recipient extracts the hiding binary image from the host image and then sets the zero-values as \( { - \pi } \) and one-values as \( \uppi \). Finally, the retrieved phase mask is decrypted and authenticated using DRPE and non-linear cross correlation algorithm, respectively. The proposed authentication scheme can provide another layer of security because the retrieved phase mask cannot reveal any original image information. Furthermore, the decrypted image from phase mask cannot be visually recognized with naked eyes which can distract the attention of attackers. Experimental results have shown the feasibility of the proposed authentication algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ghoshal, N., Mandal, J.K.: Image authentication technique in frequency domain based on discrete Fourier transformation (IATFDDFT). arXiv preprint arXiv:1212.3371 (2012)

  2. Bartolini, F., et al.: Image authentication techniques for surveillance applications. Proc. IEEE 89, 1403–1418 (2011)

    Article  Google Scholar 

  3. Petitcolas, F., Ross, J.A., Markus, G.K.: Information hiding-a survey. Proc. IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  4. Champakamala, N., Padmini, K., Radhika, D.K.: Least significant bit algorithm for image steganography. Int. J. Adv. Comput. Technol. 3, 3–38 (2013)

    Google Scholar 

  5. Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 6, 218932 (2002)

    MATH  Google Scholar 

  6. Gupta, S., Ankur, G., Bharat, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Modern Educ. Comput. Sci. 4, 27 (2012)

    Article  Google Scholar 

  7. Asad, M., Gilani, J., Khalid, A.: An enhanced least significant bit modification technique for audio steganography. In: International Conference on Computer Networks and Information Technology (ICCNIT). IEEE (2011)

    Google Scholar 

  8. Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)

    Article  Google Scholar 

  9. Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)

    Article  Google Scholar 

  10. Yi, F., Moon, I., Lee, Y.H.: A multispectral photon-counting double random phase encoding scheme for image authentication. Sensors 14, 8877–8894 (2014)

    Article  Google Scholar 

  11. Moon, I., et al.: Avalanche and bit independence characteristics of double random phase encoding in the Fourier and Fresnel domains. JOSA A 31, 110–1111 (2014)

    Article  Google Scholar 

  12. Lee, J., et al.: Graphics processing unit–accelerated double random phase encoding for fast image encryption. Opt. Eng. 53, 112308 (2014)

    Article  Google Scholar 

  13. Moon, I., et al.: Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. Appl. Opt. 55, 4328–4335 (2016)

    Article  Google Scholar 

  14. Javidi, B.: Nonlinear joint power spectrum based optical correlation. Appl. Opt. 28, 2358–2367 (1989)

    Article  Google Scholar 

  15. Yi, F.: Photon-counting double-random-phase image authentication in the Fresnel domain. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10040, pp. 487–497. Springer, Cham (2016). doi:10.1007/978-3-319-48674-1_43

    Chapter  Google Scholar 

  16. Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25, 887–889 (2000)

    Article  Google Scholar 

  17. Li, H., Wang, Y.: Double-image encryption based on iterative gyrator transform. Opt. Commun. 281, 5745–5749 (2008)

    Article  Google Scholar 

  18. Pérez-Cabré, E., Cho, M., Javidi, B.: Information authentication using photon-counting double-random-phase encrypted images. Opt. Lett. 36, 22–24 (2011)

    Article  Google Scholar 

  19. Cho, M., Javidi, B.: Three-dimensional photon counting double-random-phase encryption. Opt. Lett. 38, 3198–3201 (2013)

    Article  Google Scholar 

  20. Chen, Y., et al.: An improved watermarking method based on double random phase encoding technique. Opt. Laser Technol. 42, 617–623 (2010)

    Article  Google Scholar 

  21. Sheng, Y., et al.: Information hiding based on double random-phase encoding and public-key cryptography. Opt. Express 17, 3270–3284 (2009)

    Article  Google Scholar 

  22. Cai, L., et al.: Digital image encryption and watermarking by phase-shifting interferometry. Appl. Opt. 43, 3078–3084 (2004)

    Article  Google Scholar 

  23. Chen, W., Chen, X.: Double random phase encoding using phase reservation and compression. J. Opt. 16, 025402 (2014)

    Article  Google Scholar 

  24. Chen, W., et al.: Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photonics J. 5, 6900113 (2013)

    Article  Google Scholar 

  25. Chan, C., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  26. Fillatre, L.: Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Signal Process. 60, 556–569 (2012)

    Article  MathSciNet  Google Scholar 

  27. Xia, Z., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)

    Article  Google Scholar 

  28. Yuan, C., Sun, X., Lv, R.: Fingerprint liveness detection based on multi-scale LPQ and PCA. China Commun. 13, 60–65 (2016)

    Article  Google Scholar 

  29. Wan, J., et al.: Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools Appl. 1–7 (2016)

    Google Scholar 

  30. Huang, L., et al.: AutoODC: automated generation of orthogonal defect classifications. Autom. Softw. Eng. 22, 3–46 (2015)

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2015R1A2A1A10052566).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Inkyu Moon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yi, F., Jeoung, Y., Geng, R., Moon, I. (2017). Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics