Multimedia Tools and Applications

, Volume 76, Issue 14, pp 15435–15463 | Cite as

Tamper detection and image recovery for BTC-compressed images

  • Yu-Chen Hu
  • Kim-Kwang Raymond Choo
  • Wu-Lin Chen


To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.


Tamper detection Image recovery Block truncation coding Image authentication Fragile watermarking 



This research was supported by Providence University, Taichung, Taiwan under contract the National Science Council, Taipei, R.O.C. under contract MOST 103-2410-H-126-009-MY3 and MOST-103-2632-E-126-001MY3.


  1. 1.
    Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the art. Forensic Sci Int 231(1–3):284–295CrossRefGoogle Scholar
  2. 2.
    Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739CrossRefzbMATHGoogle Scholar
  3. 3.
    Chuang JC, Hu YC (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 22:440–449CrossRefGoogle Scholar
  4. 4.
    Chuang JC, Hu YC, Lo CC, Chen WL (2013) Grayscale image tamper detection and recovery based on vector quantization. Int J Secur Appl 7(6):209–228Google Scholar
  5. 5.
    Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimedia Tools Appl 39(1):1–46CrossRefGoogle Scholar
  6. 6.
    He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566CrossRefzbMATHGoogle Scholar
  7. 7.
    Hu YC, Chen WL, Lo CC, Wu CM (2013) A novel tamper detection scheme for BTC compressed images. Opto-Electron Rev 21(1):137–146CrossRefGoogle Scholar
  8. 8.
    Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on AMBTC. J Electron Imaging 22(1):013012CrossRefGoogle Scholar
  9. 9.
    Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int J Secur Appl 7(3):11–32Google Scholar
  10. 10.
    Lee CW, Tsai WH (2013) A data hiding method based on information sharing via PNG images for applications of color imageauthentication and metadata embedding. Signal Process 93(7):2010–2025CrossRefGoogle Scholar
  11. 11.
    Lin CY, Chang SF (2001) A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Technol 11:153–168CrossRefGoogle Scholar
  12. 12.
    Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185CrossRefGoogle Scholar
  13. 13.
    Lo CC, Hu YC, Chen WL, Chang IC (2014) Probability-based image authentication scheme for indexed color images. J Electron Imaging 23(3):033003CrossRefGoogle Scholar
  14. 14.
    Nguyen TS, Chang CC, Chung TF (2014) A tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans Internet Inform Syst 8(6):2005–2021CrossRefGoogle Scholar
  15. 15.
    Qian ZX, Feng GR, Zhang XP, Wang SZ (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286CrossRefGoogle Scholar
  16. 16.
    Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150CrossRefGoogle Scholar
  17. 17.
    Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Appl Signal Process 2002(1):613–621CrossRefzbMATHGoogle Scholar
  18. 18.
    Tsai PY, Hu YC, Chang CC (2003) Using set partitioning in hierarchical trees to authenticate digital images. Signal Process Image Commun 18:813–822CrossRefGoogle Scholar
  19. 19.
    Wang SS, Tsai SL (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn 41:701–712CrossRefzbMATHGoogle Scholar
  20. 20.
    Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601CrossRefzbMATHGoogle Scholar
  21. 21.
    Wu CM, Hu YC, Liu KY, Chuang JC (2014) A novel active image authentication scheme for block truncation coding. Int J Signal Process Image Process Pattern Recogn 7(5):13–26Google Scholar
  22. 22.
    Yang Q, Peng F, Li JT, Long M Image tamper detection based on noise estimation and lacunarity texture. Multimedia Tools and Applications. doi:  10.1007/s11042-015-3079-2
  23. 23.
    Zhang XP, Wang SZ, Qian ZX, Feng GR (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90(12):3026–3036CrossRefzbMATHGoogle Scholar
  24. 24.
    Zhu XZ, Ho ATS, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Yu-Chen Hu
    • 1
  • Kim-Kwang Raymond Choo
    • 2
    • 3
  • Wu-Lin Chen
    • 1
  1. 1.Department of Computer Science and Information ManagementProvidence UniversityTaichung CityRepublic of China
  2. 2.Department of Information Systems and Cyber SecurityUniversity of Texas at San AntonioSan AntonioUSA
  3. 3.School of Information Technology and Mathematical SciencesUniversity of South AustraliaAdelaideAustralia

Personalised recommendations