Skip to main content
Log in

On the security of a BTC-based-compression image authentication scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With image integrity in mind, the sensitivity-of-tamper property of a new image authentication scheme is always one of main concerns. However, to claim integrity guarantee of image authentication techniques is meaningful only when the false negative probability is taken into consideration. In this paper, the security of an image authentication scheme based on Block-Truncation-Coding (BTC) compression proposed by Li et al. is analyzed. The false alarm of their scheme is shown unneglectable in this paper. Precisely, it is potentially problematic since their scheme only protects the quantization values of BTC codes, but ignores the bitmap part. The main weak design will be shown by means of conducting some counter experiments. Thanks to Li et al.’s well design to protect the two values of quantization levels of the compressed image, the improvement to remove the potential security concern is simple. The experimental results and the further analysis demonstrate that the simple and secure improvement does work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Bayer BE (1976) Color Imaging Array, US patent 3,971,065, Jul 20

  2. Chan CS, Chang CC (2007) An efficient image authentication method based on Hamming code. Pattern Recogn 40:681–690

    Article  MATH  Google Scholar 

  3. Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661

    Article  MATH  Google Scholar 

  4. Guo JM, Prasetyo H, Wong K (2016) Halftoning-based block truncation coding image restoration. J Vis Commun Image Represent 35:193–197

    Article  Google Scholar 

  5. Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. Journal of Electronic Imaging 22(1):013012–013012

    Article  Google Scholar 

  6. Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. International Journal of Security and Its Applications 7(3):11–32

    Google Scholar 

  7. Hu YC, Choo KKR, Chen WL (2016) Tamper detection and image recovery for BTC-compressed images. Multimedia Tools and applications: 1-29

  8. Kim W, Lee HJ (2016) RGBW image compression by low-complexity adaptive multi-level block truncation coding. IEEE Trans Consum Electron 62:412–419

    Article  Google Scholar 

  9. Lema M, Mitchell R (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  10. Li W, Lin CC, Pan JS (2016) Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimedia Tools and Applications 75(8):4771–4793

    Article  Google Scholar 

  11. Liang RZ, Shi L, Wang H, Meng J, Wang JJY, Sun Q, Gu Y (2016) Optimizing top precision performance measure of content-based image retrieval by learning similarity function. Proceedings of 2016 23st International Conference on Pattern Recognition (ICPR)

  12. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  13. Lin RD, Chen TH, Huang CC, Lee WB, Chen WSE (2009) A secure image authentication scheme with tampering proof and remedy based on Hamming code. International Journal of Innovative Computing Information and Control 5:2603–2261

    Google Scholar 

  14. Lin CH, Chen TH, Chiu CW (2013) Color image authentication with tamper detection and remedy based on BCH and Bayer pattern. Displays 34:59–68

    Article  Google Scholar 

  15. Lin CC, Huang Y, Tai WL (2017) A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimedia Tools and Applications 76(1):463–488

    Article  Google Scholar 

  16. Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J Vis Commun Image Represent 29:46–60

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous referees for their valuable discussions and comments. This work was partially supported by Ministry of Science and Technology, Taiwan, R.O.C., under contract by MOST 105-2221-E-415 -012 -.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzung-Her Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, TH., Chang, TC. On the security of a BTC-based-compression image authentication scheme. Multimed Tools Appl 77, 12979–12989 (2018). https://doi.org/10.1007/s11042-017-4927-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4927-z

Keywords

Navigation