Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy

Yi-Hui Chen; Chin-Chen Chang
February 2012
Journal of Digital Information Management;Feb2012, Vol. 10 Issue 1, p39
Academic Journal
Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir's scheme, which can authenticate the shares in advance and then recover the inauthentic parts to reconstruct the original secret image. The experimental results provided positive results for the feasibility of the proposed scheme.


Related Articles

  • Analysis of an Unconditionally Secure Distributed Oblivious Transfer. Ghodosi, Hossein // Journal of Cryptology;Winter2013, Vol. 26 Issue 1, p75 

    In the Journal of Cryptology (20(3):323-373, ), Blundo, D'Arco, De Santis and Stinson proposed a general model for unconditionally secure distributed oblivious transfer (DOT), where a sender has n secrets and a receiver is interested to one of them. We show that their ' t-private weak one-round...

  • Statistical Analysis of S-Box in Rijndael-AES Algorithm and Formulation of an Enhanced S-Box. Gaithuru, Juliet N.; Bakhtiari, Majid M. // Journal of Information Assurance & Security;2014, Vol. 9 Issue 4, p213 

    The internet is widely used to support services ranging from education, medicine, entertainment to e-commerce. Cryptography helps to safeguard this transmitted information using authentication, digital signatures and encryption algorithms. In this paper we focus on AES, a symmetric block cipher...

  • Image Steganography Based on Twelve Square Substitution Cipher Algorithm. Warke, Harshal N.; Chaudhari, Kirtimalini // Advances in Computational Sciences & Technology;2012, Vol. 5 Issue 2, p971 

    In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome...

  • A Review on current Methods and application of Digital image Steganography. Mohapatra, Chandan; Pandey, Manjusha // International Journal of Multidisciplinary Approach & Studies;Mar/Apr2015, Vol. 2 Issue 2, p163 

    Now a days, people mostly use internet to send and receive data because it is accurate, easier and faster than all other data communication techniques. But the main lacuna of this technique for sharing of information is its security. Different techniques are evolved to overcome this problem....

  • Survey on Universal Image Steganalysis. Desai, Madhavi B.; Patel, S. V. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p4752 

    Ooverwhelming growth in communication technology and usage of internet has greatly facilitated transfer of data. The threat of unauthorized data access is increasing along with it. Since last decade, too many data hiding methods have been proposed. Because of large number of redundant bits,...

  • Audio Steganography Using Mod 4 Method (M4M). Bhattacharyya, Souvik; Kundu, Arko; Chakraborty, Kaushik; Sanyal, Gautam // Journal of Computing;Aug2011, Vol. 3 Issue 8, p30 

    Steganography is an emerging area which is used for secured data transmission over any public media. Considerable amount of work has been carried out by different researchers on steganography. In this work the authors propose a novel stegano-graphic method for hiding information in an audio...

  • Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Cryptosystem in Wavelets. Pradhan, Chittaranjan; Saha, Bidyut Jyoti; Kabi, Kunal Kumar; Bisoi, Ajay Kumar // International Journal on Recent Trends in Engineering & Technolo;Jan2014, Vol. 10 Issue 2, p70 

    Copyright protection is a vital issue in modern day's data transmission over internet. For copyright protection, watermarking technique is extensively used. In this paper, we have proposed a robust watermarking scheme using 2D Logistic map and elliptic curve cryptosystem (ECC) in the DWT domain....

  • Secured Data Transmission Using Wavelet Based Steganography and Cryptography Using Different DES Methods. Raju, U. S. N.; Bhaskar, N. Uday // Journal of Wavelet Theory & Applications;2013, Vol. 7 Issue 1, p19 

    In this paper, steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. Steganography is implemented in Digital Images(Gray image). A technique called Least Significant Method (LSB) is used to embed the data...

  • Secure Data Hiding Technique using Video Steganography and Watermarking. Khosla, Shivani; Kaur, Paramjeet // International Journal of Computer Applications;Jun2014, Vol. 95, p7 

    The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. Besides this, anyone can modify and misuse the valuable information through hacking at the same time. This paper presents video steganography with digital watermarking...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics