Abstract
A novel image authentication scheme for the compressed images of block truncation coding (BTC) is proposed in this paper. In the proposed scheme, 1-bit authentication data is generated from the quantization levels of each image block. Multiple block permutations are generated by using the random sequences induced by the selected random number seeds. Multiple copies of the authenticaiton data are embedded into the bit maps of BTC-compressed image blocks based on the block permutations. Experimental results show that the proposed scheme achieves good detecting accuracy while keeping good image quatiy of the embedded image.
Similar content being viewed by others
References
E.J. Delp and O.R. Mitcell, “Image compression using block truncation coding”, IEEE T. Commun. 27, 1335–1342 (1979).
M.D. Lema and O.R. Mitchell, “Absolute moment block truncation coding and its application to colour image”, IEEE T. Commun. 32, 1148–1157 (1984).
Y.C. Hu, B.H. Su, and P.Y. Tsai, “Colour image coding scheme using absolute moment block truncation coding and block prediction technique”, Imaging Sci. J. 56, 254–270 (2008).
Y. Yang, Q. Chen, and Y. Wan, “A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation”, AEUE — Int. J. Electron. Commun. 65, 576–581 (2011).
Y.C. Hu, W.L. Chen, C.C. Lo, and J.C. Chung, “An improved vector quantization scheme for grayscale image compression”, Opto-Electron. Rev. 20, 187–193 (2012).
F. Bartolini, A. Tefas, M. Bami, and I. Pitas, “Image authentication techniques for surveillance applications”, Proc. IEEE 89, 1403–418 (2001).
D.C. Lou and J.L. Liu, “Fault resilient and compression tolerant digital signature for image authentication”, IEEE T. Consum. Electr. 46, 31–39 (2000).
L. Xie, G.R. Arce and R.F. Graveman, “Approximate image message authentication codes”, IEEE T. Multimedia 3, 242–252 (2001).
P.Y. Tsai, Y.C. Hu, and C.C. Chang, “A novel image authentication scheme based on quadtree segmentation”, Imaging Sci. J. 53, 149–162 (2005).
S. Ababneh, R. Ansari, and A. Khokhar, “Iterative compensation schemes for multimedia content authentication”, J. Vis. Commun. Image R. 20, 303–311 (2009).
C.Y. Lin and S.F. Chang, “A robust image authentication method distinguish JPEG compression from malicious manipulation”, IEEE T. Circ. Syst. Vid. 11, 153–168 (2001).
P.W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification”, IEEE T. Image Process. 10, 1593–1601 (2001).
T.Y. Lee and S.D. Lin, “Dual watermark for image tamper detection and recovery”, Pattern Recogn. 41, 3497–3506 (2008).
F. Ahmed and M.Y. Siyal, “A secure and robust hash-based scheme for image authentication”, Signal Process. 90, 1456–1470 (2010).
X. Qi and X. Xin, “A quantization-based semi-fragile watermarking scheme for image content authentication”, J. Vis. Commun. Image R. 22, 187–200 (2011).
J.C. Chuang and Y.C. Hu, “An adaptive image authentication scheme for vector quantization compressed image”, J. Vis. Commun. Image R. 22, 440–449 (2011).
C.S. Chan, “An image authentication method by applying Hamming code on rearranged bits”, Pattern Recogn. Lett. 32, 1679–1690 (2011).
C. Li, Y. Wang, B. Ma, and Z. Zhang, “Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme”, Comp. Stand. Inter. 34, 367–379 (2012).
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Hu, Y.C., Chen, W.L., Lo, C.C. et al. A novel tamper detection scheme for BTC-compressed images. Opto-Electron. Rev. 21, 137–146 (2013). https://doi.org/10.2478/s11772-013-0078-6
Published:
Issue Date:
DOI: https://doi.org/10.2478/s11772-013-0078-6