Abstract
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.
Similar content being viewed by others
References
Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the art. Forensic Sci Int 231(1–3):284–295
Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739
Chuang JC, Hu YC (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 22:440–449
Chuang JC, Hu YC, Lo CC, Chen WL (2013) Grayscale image tamper detection and recovery based on vector quantization. Int J Secur Appl 7(6):209–228
Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimedia Tools Appl 39(1):1–46
He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566
Hu YC, Chen WL, Lo CC, Wu CM (2013) A novel tamper detection scheme for BTC compressed images. Opto-Electron Rev 21(1):137–146
Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on AMBTC. J Electron Imaging 22(1):013012
Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int J Secur Appl 7(3):11–32
Lee CW, Tsai WH (2013) A data hiding method based on information sharing via PNG images for applications of color imageauthentication and metadata embedding. Signal Process 93(7):2010–2025
Lin CY, Chang SF (2001) A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Technol 11:153–168
Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185
Lo CC, Hu YC, Chen WL, Chang IC (2014) Probability-based image authentication scheme for indexed color images. J Electron Imaging 23(3):033003
Nguyen TS, Chang CC, Chung TF (2014) A tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans Internet Inform Syst 8(6):2005–2021
Qian ZX, Feng GR, Zhang XP, Wang SZ (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286
Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150
Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Appl Signal Process 2002(1):613–621
Tsai PY, Hu YC, Chang CC (2003) Using set partitioning in hierarchical trees to authenticate digital images. Signal Process Image Commun 18:813–822
Wang SS, Tsai SL (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn 41:701–712
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601
Wu CM, Hu YC, Liu KY, Chuang JC (2014) A novel active image authentication scheme for block truncation coding. Int J Signal Process Image Process Pattern Recogn 7(5):13–26
Yang Q, Peng F, Li JT, Long M Image tamper detection based on noise estimation and lacunarity texture. Multimedia Tools and Applications. doi: 10.1007/s11042-015-3079-2
Zhang XP, Wang SZ, Qian ZX, Feng GR (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90(12):3026–3036
Zhu XZ, Ho ATS, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528
Acknowledgments
This research was supported by Providence University, Taichung, Taiwan under contract the National Science Council, Taipei, R.O.C. under contract MOST 103-2410-H-126-009-MY3 and MOST-103-2632-E-126-001MY3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hu, YC., Choo, KK.R. & Chen, WL. Tamper detection and image recovery for BTC-compressed images. Multimed Tools Appl 76, 15435–15463 (2017). https://doi.org/10.1007/s11042-016-3847-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3847-7