Visible to the public Digital Image Self Restoration Based on Information Hiding

TitleDigital Image Self Restoration Based on Information Hiding
Publication TypeConference Paper
Year of Publication2018
AuthorsLi, Y., Guan, Z., Xu, C.
Conference Name2018 37th Chinese Control Conference (CCC)
Date Publishedjul
Keywordscomposability, computer networks, data compression, data encapsulation, data mining, digital image self restoration, digital images, digital media, Digital Watermark, digital watermarking, discrete cosine transform, discrete cosine transforms, forensic evidence, hash algorithm, higher-quality reconstruction, Image coding, Image reconstruction, image restoration, image watermarking, Information hiding, Jarvis, Jarvis half-tone change, Media, multimedia information, pubcrawl, quality assessment, quantization truncation, reference authentication system, reference data, resilience, self-embedding, self-healing images, self-healing networks, social network, Watermarking
AbstractWith the rapid development of computer networks, multimedia information is widely used, and the security of digital media has drawn much attention. The revised photo as a forensic evidence will distort the truth of the case badly tampered pictures on the social network can have a negative impact on the parties as well. In order to ensure the authenticity and integrity of digital media, self-recovery of digital images based on information hiding is studied in this paper. Jarvis half-tone change is used to compress the digital image and obtain the backup data, and then spread the backup data to generate the reference data. Hash algorithm aims at generating hash data by calling reference data and original data. Reference data and hash data together as a digital watermark scattered embedded in the digital image of the low-effective bits. When the image is maliciously tampered with, the hash bit is used to detect and locate the tampered area, and the image self-recovery is performed by extracting the reference data hidden in the whole image. In this paper, a thorough rebuild quality assessment of self-healing images is performed and better performance than the traditional DCT(Discrete Cosine Transform)quantization truncation approach is achieved. Regardless of the quality of the tampered content, a reference authentication system designed according to the principles presented in this paper allows higher-quality reconstruction to recover the original image with good quality even when the large area of the image is tampered.
DOI10.23919/ChiCC.2018.8483729
Citation Keyli_digital_2018