Skip to main content
Log in

Novel image authentication scheme with fine image quality for BTC-based compressed images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel image authentication scheme which can protect the image integrity of the compressed images for block truncation coding (BTC) is proposed in this paper. In the proposed scheme, the authentication codes are embedded into the the quatization levels of each BTC-compressed image block by using reference matrix– RM B . The size of the authentication codes can be decided according to the user’s requirement by adjusting the value of B in Reference Matrix. The experimental results demonstrate that the proposed method outperforms previous approaches in image quality of the embedded image and high detecting accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Trans Comput 100(1): 90–93

    Article  MathSciNet  MATH  Google Scholar 

  2. Bartolini F, Tefas A, Barni M, Pitas I (2001) Image authentication techniques for surveillance applications. Proceedings of the IEEE 89(10):1403–1418

    Article  Google Scholar 

  3. Chang C-C, Lin C-Y, Fan Y-H (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recognition 41(7):2347–2357

    Article  MATH  Google Scholar 

  4. Delp EJ, Mitchell Robert O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

  5. Deng C, Gao X, Li X, Tao D (2009) A local tchebichef moments-based robust image watermarking. Signal Process 89(8):1531–1539

    Article  MATH  Google Scholar 

  6. Friedman GL (1993) The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans Consum Electron 39(4):905–910

    Article  Google Scholar 

  7. Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):278–286

    Article  Google Scholar 

  8. Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4–29

    Article  Google Scholar 

  9. Haralick RM, Sternberg SR, Zhuang X (1987) Image analysis using mathematical morphology. IEEE Transactions on Pattern Analysis and Machine Intelligence 9(4):532–550

    Article  Google Scholar 

  10. Huang H-C, Chang F-C (2014) Robust image watermarking based on compressed sensing techniques. Journal of Information Hiding and Multimedia Signal Processing 5 (2): 327–332

    MathSciNet  Google Scholar 

  11. Hu Y-C, Lo C-C, Chen W-L, Wen C-H (2013) Joint image coding and image authentication based on absolute moment block truncation coding. Journal of Electronic Imaging 22(1):013012–013012

    Article  Google Scholar 

  12. Hu Y-C, Lo C-C, Wu C-M, Chen W-L, Wen C-H (2013) Probability-based tamper detection scheme for btc-compressed images based on quantization levels modification. International Journal of Security & Its Applications 7 (3)

  13. Lema M, Mitchell RO (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  14. Lin C-C, Liu X-L, Tai W-L, Yuan S-M (2013) A novel reversible data hiding scheme based on ambtc compression technique. Multimedia Tools and Applications:1–20

  15. Qin C, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  16. Qin C, Chang C-C, Chen K-N (2013) Adaptive self-recovery for tampered images based on vq indexing and inpainting. Signal Process 93(4):933–946

    Article  Google Scholar 

  17. Tefas A, Pitas I (2000) Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European signal processing conference (EUSIPCO 2000). vol 3, p 1681–1684, Tampere, Finland

  18. Tsui S-R, Huang C-T, Wang W-J (2013) A new adaptive steganographic method based on gradient adjacent prediction and side-match vector quantization. Journal of Information Hiding and Multimedia Signal Processing

  19. Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: Proceedings of IEEE International Conference on Image Processing, vol 3, p 219–222

  20. Yanga C-H, Linb C-Y, Hua W-C (2012) Reversible data hiding for high-quality images based on integer wavelet transform. Journal of Information Hiding and Multimedia Signal Processing

  21. Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of IEEE International Conference on Image Processing, vol 2, p 680–683

  22. Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimedia Tools and Applications 54(2):385–395

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeng-Shyang Pan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, W., Lin, CC. & Pan, JS. Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimed Tools Appl 75, 4771–4793 (2016). https://doi.org/10.1007/s11042-015-2502-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2502-z

Keywords

Navigation