Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
Citation:
Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
Citation:
Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
1(Chongqing Key Laboratory of Image Cognition(Chongqing University of Posts and Telecommunications), Chongqing 400065)
2(School of Cyber Engineering, Xidian University, Xi’an 710071)
Funds: This work was supported by the National Natural Science Foundation of China (61806032, 61976031), the National Key Research and Development Program of China (2016YFC1000307-3), the Scientific & Technological Research Program of Chongqing Municipal Education Commission (KJQN201800611), the Chongqing Research Program of Application Foundation & Advanced Technology (cstc2018jcyjAX0117), and the Scientific & Technological Key Research Program of Chongqing Municipal Education Commission (KJZD-K201800601).
An authentication based on Shamir secret sharing with tampering detection and data recovery capability for document images is proposed, which includes two processes: tampering protection generation, and tampering detection and recovery. In the process of tampering protection generation, in order to improve the tampering detection accuracy and recover effect of existing document images authentication methods, a method of tampering detection signal generation based on weight is proposed in this paper. Firstly, it extracts characteristics for each 2×3 non-overlapping block. After that, the block characteristics and block content are put into the Shamir secret sharing scheme to generate multiple shares for tampered blocks detection and repair. Finally, the shares of the block constitute the α channel plane and combine with the original image to form a PNG(portable network graphic format)image. During the authentication process, the authentication signal extracted from the shares in the α channel plane can determine whether the image block has been tampered with, and can repair the content of the tampered image block through the reverse operation of Shamir secret sharing scheme. Experiments show that the proposed method not only has good tamper detection and the effectiveness of data repair, but also has good robustness against image clipping and noise attack.