A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images

作者: Nithya Chidambaram , Pethuru Raj , Karuppusamy Thenmozhi , Rengarajan Amirtharajan , None

DOI: 10.1007/S11042-020-10210-2

关键词: Image (mathematics)Computer scienceTransmission (telecommunications)Region of interestHash functionComputer hardwareCode (cryptography)Process (computing)

摘要: Image sharing in open and public communication infrastructure is vulnerable. There are several solutions articulated by worldwide researchers for secure image transmission. However, with the increasing computing capacity capability, currently available security being breached. This yearns more robust solutions. The significant contribution of proposed work involves generation a new hash algorithm entire RGB size 256 × 256 no Region Interest (RoI) restriction. paper mainly focuses on integrity verification, tamper detection, localisation tampered area its restoration. whole considered as sensitive data which one-way verification code generated block-wise to locate areas tampering. Integrity validation phase will compare received digest from image. Blocks failed pass undergo recovery process.

参考文章(34)
K.-C. Liu, Colour image watermarking for tamper proofing and pattern-based recovery Iet Image Processing. ,vol. 6, pp. 445- 454 ,(2012) , 10.1049/IET-IPR.2011.0574
Yu-Chen Hu, Chun-Chi Lo, Wu-Lin Chen, Probability-based reversible image authentication scheme for image demosaicking Future Generation Computer Systems. ,vol. 62, pp. 92- 103 ,(2016) , 10.1016/J.FUTURE.2016.04.001
Minhaj Ahmad Khan, A survey of security issues for cloud computing Journal of Network and Computer Applications. ,vol. 71, pp. 11- 29 ,(2016) , 10.1016/J.JNCA.2016.05.010
Jiachen Yang, Huanling Wang, Zhihan Lv, Wei Wei, Houbing Song, Melike Erol-Kantarci, Burak Kantarci, Shudong He, Multimedia recommendation and transmission system based on cloud platform Future Generation Computer Systems. ,vol. 70, pp. 94- 103 ,(2017) , 10.1016/J.FUTURE.2016.06.015
Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing, More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22 international conference on the theory and application of cryptology and information security. pp. 307- 329 ,(2016) , 10.1007/978-3-662-53887-6_11
Shahla Asadi, Mehrbakhsh Nilashi, Abd Razak Che Husin, Elaheh Yadegaridehkordi, Customers perspectives on adoption of cloud computing in banking sector Information Technology & Management. ,vol. 18, pp. 305- 330 ,(2017) , 10.1007/S10799-016-0270-8
Qingtang Su, Gang Wang, Xiaofeng Zhang, Gaohuan Lv, Beijing Chen, A new algorithm of blind color image watermarking based on LU decomposition Multidimensional Systems and Signal Processing. ,vol. 29, pp. 1055- 1074 ,(2018) , 10.1007/S11045-017-0487-7
Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, Pradeep K. Atrey, Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System ACM Transactions on Multimedia Computing, Communications, and Applications. ,vol. 13, pp. 23- ,(2017) , 10.1145/3077140
Ankan Bhattacharya, Sarbani Palit, Blind quality assessment of image and video based on fragile watermarking and robust features Multidimensional Systems and Signal Processing. ,vol. 29, pp. 1679- 1709 ,(2018) , 10.1007/S11045-017-0518-4