Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

A real-time reversible image authentication method using uniform embedding strategy


Reversible image authentication (RIA) is an emerging research field for image tampering operation detection. Tampered regions can be localized precisely by embedding an authentication code (AC) into each divided image block in advance. Once the image is identified as an authentic image, the original image can be recovered without any loss. Under these two preconditions, an efficient RIA scheme is proposed to further improve the detection precision of the final authentication results. Compared with existing methods, a uniform embedding strategy is adopted in this paper, in which one AC bit is embedded into each divided image block to ensure they have the same authentication capability. To improve the forgery localization precision, the block size is adaptively sought according to the embedding capacity of the image. In addition, during the image authentication process, the embedding parameters and location map information are verified to increase the process’s rigorousness. The experimental results demonstrate the superiority of the detection precision of the proposed method.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9


  1. 1.

    Zhou, Z., Wu, Q.M.J., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data (2019).

  2. 2.

    Qi, L., Wang, R., Li, S., He, Q., Xu, X., Hu, C.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354–364 (2019)

  3. 3.

    Qi, L., Zhang, X., Dou, W., Hu, C., Yang, C., Chen, J.: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur. Gener. Comp. Syst. 88, 636–643 (2018)

  4. 4.

    Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017)

  5. 5.

    Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. 25(3), 36–48 (2018)

  6. 6.

    Bravo-Solorio, S., Calderon, F., Li, C.T., Nandi, A.K.: Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit. Signal Process. 73, 83–92 (2018)

  7. 7.

    Qin, C., Chen, X., Ye, D., Wang, J., Sun, X.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361, 84–99 (2016)

  8. 8.

    Qin, C., Hu, Y., Yao, H., Duan, X., Gao, L.: Perceptual image hashing based on a Weber local binary pattern and color angle representation. IEEE Access. 7, 45460–45471 (2019)

  9. 9.

    Tang, Z., Chen, L., Zhang, X., Zhang, S.: Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31(3), 549–560 (2019)

  10. 10.

    Qiao, T., Shi, R., Luo, X.Y., Xu, M., Zheng, N., Wu, Y.M.: Statistical model-based detector via texture weight map: application in re-sampling authentication. IEEE Trans. Multimed. 21(5), 1077–1092 (2019)

  11. 11.

    Yao, H., Wang, S.Z., Zhang, X.P., Qin, C., Wang, J.W.: Detecting image splicing based on noise level inconsistency. Multimed. Tools Appl. 76(10), 12457–12479 (2017)

  12. 12.

    Yao, H., Cao, F., Tang, Z.J., Wang, J.W., Qiao, T.: Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multimed. Tools Appl. 77(14), 18139–18161 (2018)

  13. 13.

    Wang, J., Li, T., Li, T., Luo, X., Shi, Y.Q., Jha, S.K.: Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE Trans. Circuits Syst. Video Technol. (2018).

  14. 14.

    Wang, J., Wang, H., Li, J., Luo, X., Shi, Y.Q., Jha, S.K.: Detecting double JPEG compressed color images with the same quantization matrix in spherical coordinate. IEEE Trans. Circuits Syst. Video Technol. (2019).

  15. 15.

    Iakovidou, C., Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. Vis. Commun. Image Represent. 54, 155–170 (2018)

  16. 16.

    Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152–163 (2017)

  17. 17.

    Weng, S.W., Pan, J.S., Li, L.D.: Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding. Inf. Sci. 369, 144–159 (2016)

  18. 18.

    Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010–5021 (2013)

  19. 19.

    Ou, B., Li, X.L., Wang, J.W., Peng, F.: High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing. 226, 23–34 (2017)

  20. 20.

    Li, X.L., Zhang, W.M., Gui, X.L., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensic Secur. 10(9), 2016–2027 (2015)

  21. 21.

    Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109–1118 (2013)

  22. 22.

    Dragoi, I.C., Coltuc, D.: Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23(4), 1779–1790 (2014)

  23. 23.

    Coltuc, D.: Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21(1), 412–417 (2012)

  24. 24.

    Li, X.L., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198–205 (2013)

  25. 25.

    Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process. 98, 174–185 (2014)

  26. 26.

    Nguyen, T.S., Chang, C.C., Shih, T.H.: A high-quality reversible image authentication scheme based on adaptive PEE for digital images. KSII Trans. Internet Inf. Syst. 10(1), 395–413 (2016)

  27. 27.

    Wang, X., Ding, J., Pei, Q.Q.: A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 310, 16–35 (2015)

  28. 28.

    Yin, Z.X., Niu, X.J., Zhou, Z.L., Tang, J., Luo, B.: Improved reversible image authentication scheme. Cogn. Comput. 8(5), 890–899 (2016)

  29. 29.

    Hong, W.E., Chen, M.J., Chen, T.S.: An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process. Image Commun. 58, 111–122 (2017)

  30. 30.

    Peng, F., Li, X.L., Yang, B.: Improved PVO-based reversible data hiding. Digit. Signal Prog. 25, 255–265 (2014)

  31. 31.

    Gao, G., Cui, Z., Zhou, C.: Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Process. Lett. 25(7), 1099–1103 (2018)

  32. 32.

    Ou, B., Li, X.L., Wang, J.W.: Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J. Vis. Commun. Image Represent. 38, 328–339 (2016)

  33. 33.

    Ou, B., Li, X.L., Wang, J.W.: High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 39, 12–23 (2016)

  34. 34.

    He, W.G., Cai, J., Zhou, K., Xiong, G.Q.: Efficient PVO-based reversible data hiding using multistage blocking and prediction accuracy matrix. J. Vis. Commun. Image Represent. 46, 58–69 (2017)

  35. 35.

    He, W.G., Xiong, G.Q., Weng, S.W., Cai, Z.C., Wang, Y.M.: Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf. Sci. 467, 784–799 (2018)

  36. 36.

    Lee, C.F., Shen, J.J., Kao, Y.C., Agrawal, S.: Overlapping pixel value ordering predictor for high-capacity reversible data hiding. J Real-Time Image Proc (2019).

Download references


We would like to thank Drs Wien Hong and Zhaoxia Yin for kindly sharing the codes of their works with us. This work was supported in part by the National Natural Science Foundation of China (61702332, 61672354, 61562007) and Guangxi Natural Science Foundation (2017GXNSFAA198222). The authors would like to thank the anonymous reviewers for their valuable suggestions.

Author information

Correspondence to Chuan Qin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yao, H., Wei, H., Qin, C. et al. A real-time reversible image authentication method using uniform embedding strategy. J Real-Time Image Proc 17, 41–54 (2020).

Download citation


  • Image authentication
  • Tamper detection
  • Pixel value ordering
  • Reversible data hiding