A Novel Approach on Image Diversity for Image Authentication

Harpreet Kaur, Manpreet Singh


The inefficiency of many image processing techniques to regenerate the original image from the received forged image results in wastage of time and resources for retransmission of image. Therefore a new authentication algorithm is required which is well capable to regenerate the image from its false version received. Such an algorithm is presented in this article that works on the principle of diversity i.e. same data could not get corrupted at same places at the same time. This not only provides integrity but also eliminates the need of retransmission of image and hence, avoids extra burden of the transmitter. This scheme is more suitable in areas where limited resources are available such that retransmission of data multiple times is prohibited. The effectiveness of the proposed scheme is also tested for practical applications


Hash, Integrity, Image forgery, Reversible data embedding, Security, Tampering localization.

Full Text:



. Ching-Yung L, Shih-Fu C. Robust digital signature for multimedia authentication. IEEE Circuits and Systems Magazine 2003; 3(4): 23-6.

. Sun Q, Shih-Fu C. A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Transactions Multimedia 2005; 7(3): 480-94.

. Wong PW, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 2001; 10(10): 1593-601.

. Celik MU, Sharma G, Murat Tekalp A. Lossless Watermarking for Image Authentication: A New Framework and

an Implementation. IEEE Transactions on Image Processing 2006; 15(4): 1042-9.

. Saad SM. Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Information Security 2009; 3(1): 1-8.

. Wu M, Liu B. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 2004; 6(4): 528-38.

. Yang H, Kot AC. Pattern-based data hiding for binary images authentication by connectivity-preserving. IEEE Transactions on Multimedia 2007; 9(3): 475-86.

. Piper A, Safavi-Naini R. Scalable fragile watermarking for image authentication. IET Information Security 2013; 7(4): 300-11.

. Kuo-Cheng L. Self-embedding water marking scheme for colour images by bi-level moment-preserving technique. IET image Processing 2014; 8(6): 363-72.

. Zhang X, Wang S. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters 2007; 14(10): 727-30.


  • There are currently no refbacks.