A novel tamper detection scheme for BTC-compressed images

A novel image authentication scheme for the compressed images of block truncation coding (BTC) is proposed in this paper. In the proposed scheme, 1-bit authentication data is generated from the quantization levels of each image block. Multiple block permutations are generated by using the random sequences induced by the selected random number seeds. Multiple copies of the authenticaiton data are embedded into the bit maps of BTC-compressed image blocks based on the block permutations. Experimental results show that the proposed scheme achieves good detecting accuracy while keeping good image quatiy of the embedded image.

[1]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[2]  Chi-Shiang Chan An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..

[3]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[4]  Xing Xin,et al.  A quantization-based semi-fragile watermarking scheme for image content authentication , 2011, J. Vis. Commun. Image Represent..

[5]  Anastasios Tefas,et al.  Image authentication techniques for surveillance applications , 2001, Proc. IEEE.

[6]  C-C Chang,et al.  Novel image authentication scheme based on quadtree segmentation , 2005 .

[7]  Doaa Mohammed Image Compression Using Block Truncation Coding , 2011 .

[8]  Yu-Chen Hu,et al.  An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..

[9]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[10]  Y.-C. Hu,et al.  Colour image coding scheme using absolute moment block truncation coding and block prediction technique , 2008 .

[11]  Rashid Ansari,et al.  Iterative compensation schemes for multimedia content authentication , 2009, J. Vis. Commun. Image Represent..

[12]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[13]  Yi Wan,et al.  A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation , 2011 .

[14]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[15]  Bin Ma,et al.  Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme , 2012, Comput. Stand. Interfaces.

[16]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[17]  Wu-Lin Chen,et al.  Improved vector quantization scheme for grayscale image compression , 2012 .