Skip to main content
Log in

A novel tamper detection scheme for BTC-compressed images

  • Original papers
  • Published:
Opto-Electronics Review

Abstract

A novel image authentication scheme for the compressed images of block truncation coding (BTC) is proposed in this paper. In the proposed scheme, 1-bit authentication data is generated from the quantization levels of each image block. Multiple block permutations are generated by using the random sequences induced by the selected random number seeds. Multiple copies of the authenticaiton data are embedded into the bit maps of BTC-compressed image blocks based on the block permutations. Experimental results show that the proposed scheme achieves good detecting accuracy while keeping good image quatiy of the embedded image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. E.J. Delp and O.R. Mitcell, “Image compression using block truncation coding”, IEEE T. Commun. 27, 1335–1342 (1979).

    Article  Google Scholar 

  2. M.D. Lema and O.R. Mitchell, “Absolute moment block truncation coding and its application to colour image”, IEEE T. Commun. 32, 1148–1157 (1984).

    Article  Google Scholar 

  3. Y.C. Hu, B.H. Su, and P.Y. Tsai, “Colour image coding scheme using absolute moment block truncation coding and block prediction technique”, Imaging Sci. J. 56, 254–270 (2008).

    Article  Google Scholar 

  4. Y. Yang, Q. Chen, and Y. Wan, “A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation”, AEUE — Int. J. Electron. Commun. 65, 576–581 (2011).

    Article  Google Scholar 

  5. Y.C. Hu, W.L. Chen, C.C. Lo, and J.C. Chung, “An improved vector quantization scheme for grayscale image compression”, Opto-Electron. Rev. 20, 187–193 (2012).

    Article  ADS  Google Scholar 

  6. F. Bartolini, A. Tefas, M. Bami, and I. Pitas, “Image authentication techniques for surveillance applications”, Proc. IEEE 89, 1403–418 (2001).

    Article  Google Scholar 

  7. D.C. Lou and J.L. Liu, “Fault resilient and compression tolerant digital signature for image authentication”, IEEE T. Consum. Electr. 46, 31–39 (2000).

    Article  Google Scholar 

  8. L. Xie, G.R. Arce and R.F. Graveman, “Approximate image message authentication codes”, IEEE T. Multimedia 3, 242–252 (2001).

    Article  Google Scholar 

  9. P.Y. Tsai, Y.C. Hu, and C.C. Chang, “A novel image authentication scheme based on quadtree segmentation”, Imaging Sci. J. 53, 149–162 (2005).

    Article  Google Scholar 

  10. S. Ababneh, R. Ansari, and A. Khokhar, “Iterative compensation schemes for multimedia content authentication”, J. Vis. Commun. Image R. 20, 303–311 (2009).

    Article  Google Scholar 

  11. C.Y. Lin and S.F. Chang, “A robust image authentication method distinguish JPEG compression from malicious manipulation”, IEEE T. Circ. Syst. Vid. 11, 153–168 (2001).

    Article  Google Scholar 

  12. P.W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification”, IEEE T. Image Process. 10, 1593–1601 (2001).

    Article  ADS  MATH  Google Scholar 

  13. T.Y. Lee and S.D. Lin, “Dual watermark for image tamper detection and recovery”, Pattern Recogn. 41, 3497–3506 (2008).

    Article  MATH  Google Scholar 

  14. F. Ahmed and M.Y. Siyal, “A secure and robust hash-based scheme for image authentication”, Signal Process. 90, 1456–1470 (2010).

    Article  MATH  Google Scholar 

  15. X. Qi and X. Xin, “A quantization-based semi-fragile watermarking scheme for image content authentication”, J. Vis. Commun. Image R. 22, 187–200 (2011).

    Article  Google Scholar 

  16. J.C. Chuang and Y.C. Hu, “An adaptive image authentication scheme for vector quantization compressed image”, J. Vis. Commun. Image R. 22, 440–449 (2011).

    Article  Google Scholar 

  17. C.S. Chan, “An image authentication method by applying Hamming code on rearranged bits”, Pattern Recogn. Lett. 32, 1679–1690 (2011).

    Article  Google Scholar 

  18. C. Li, Y. Wang, B. Ma, and Z. Zhang, “Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme”, Comp. Stand. Inter. 34, 367–379 (2012).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. -C. Hu.

About this article

Cite this article

Hu, Y.C., Chen, W.L., Lo, C.C. et al. A novel tamper detection scheme for BTC-compressed images. Opto-Electron. Rev. 21, 137–146 (2013). https://doi.org/10.2478/s11772-013-0078-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.2478/s11772-013-0078-6

Keywords

Navigation