A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images

  • Chia-Chen LinEmail author
  • Yuehong Huang
  • Wei-Liang Tai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)


A novel hybrid image authentication scheme is proposed in this paper to protect the integrity of images that are compressed by absolute moment block truncation coding (AMBTC). In this proposed scheme, all blocks of a compressed image are classified into two groups. For smooth blocks, the authentication code for each block will be embedded into the bitmap of each block. For complex blocks, the authentication code will be embedded into quantization levels of each block according to a reference table. The experimental results show that this proposed scheme achieves high image quality of the embedded image and almost 100 % detection precision when eb = 3.


Image authentication Tamper detection Absolute moment block truncation coding Complex block Smooth block 


  1. 1.
    Lema, M.D., Mitchell, O.R.: Absolute moment block truncation coding and its application to color image. IEEE Trans. Commun. 32(10), 1148–1157 (1984)CrossRefGoogle Scholar
  2. 2.
    Lin, C.Y., Chang, S.F.: A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11(2), 153–168 (2001)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)CrossRefzbMATHGoogle Scholar
  4. 4.
    Wong, P.W.: A watermark for image integrity and ownership verification. In: Proceedings of IS&T PIC Conference, Portland, OR, May 1998Google Scholar
  5. 5.
    Wong, P.W.: A public key watermark for image verification and authentication. In: Proceedings of ICIP, Chicago, IL, October 1998Google Scholar
  6. 6.
    Lie, W.N., Lin, G.S., Chen, S.L.: Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. IEEE Trans. Inf. Forensics. Sec. 1(3), 330–341 (2006)CrossRefGoogle Scholar
  7. 7.
    Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognit. 41(11), 3497–3506 (2008)CrossRefzbMATHGoogle Scholar
  8. 8.
    Ahmed, F., Siyal, M.Y.: A secure and robust hash-based scheme for image authentication. Sig. Process. 90, 1456–1470 (2010)CrossRefzbMATHGoogle Scholar
  9. 9.
    Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)CrossRefGoogle Scholar
  10. 10.
    Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011)CrossRefGoogle Scholar
  11. 11.
    Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Imaging 22(1), 013012 (2013)CrossRefGoogle Scholar
  12. 12.
    Hu, Y.C., Lo, C.C., Wu, C.M., Chen, W.L., Wen, C.H.: Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int. J. Secur. Appl. 7(3), 11–32 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer Science and Information ManagementProvidence UniversityTaichungTaiwan
  2. 2.Department of Information CommunicationsChinese Culture UniversityTaipeiTaiwan

Personalised recommendations