Browse > Article
http://dx.doi.org/10.3837/tiis.2014.12.020

A High-Quality Image Authentication Scheme for AMBTC-compressed Images  

Lin, Chia-Chen (Department of Computer Science and Information Management Providence University)
Huang, Yuehong (Institute of Computer Science and Engineering National Chiao Tung University)
Tai, Wei-Liang (Department of Information Communications Chinese Culture University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.12, 2014 , pp. 4588-4603 More about this Journal
Abstract
In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.
Keywords
Image authentication; absolute moment block truncation coding (AMBTC); data hiding; tamper detection; security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Rabbani and P. W. Jones, Digital Image Compression Techniques, SPIE, 1991.
2 E. J. Delp and O. R. Mitchell, "Image compression using block truncation coding," IEEE Transactions on Communications, vol. 27, no. 9, pp. 1335-1342, Sept. 1979.   DOI
3 M. D. Lema and O. R. Mitchell, "Absolute moment block truncationcoding and its application to color image," IEEE Transactions on Communications, vol. 32, no. 10, pp. 1148-1157, Oct. 1984.   DOI
4 P. Franti, O. Nevalainen, and T. Kaukoranta, "Compression of digital images by block truncation coding: a survey," The Computer Journal, vol. 37, no. 4, pp. 308-332, 1994.   DOI   ScienceOn
5 A. Haouzia and R. Noumeir, "Methods for image authentication: a survey," Multimedia Tools and Applications, vol. 39, no. 1, pp. 1-46, Aug. 2008.   DOI
6 P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, Oct. 2001.   DOI   ScienceOn
7 C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.   DOI   ScienceOn
8 W. N. Lie, G. S. Lin, and S. L. Chen, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques," IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 330-341, Sept. 2006.   DOI   ScienceOn
9 T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, Nov. 2008.   DOI   ScienceOn
10 F. Ahmed and M. Y. Siyal, "A secure and robust hash-based scheme for image authentication," Signal Processing, vol. 90, no. 5, pp. 1456-1470, 2010.   DOI   ScienceOn
11 J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image," Journal of Visual Communication and Image Representation, vol. 22, no. 5, pp. 440-449, Jul. 2011.   DOI   ScienceOn
12 X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication," Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 187-200, Feb. 2011.   DOI   ScienceOn
13 Y. C. Hu, C. C. Lo, W. L. Chen, and C. H. Wen, "Joint image coding and image authentication based on absolute moment block truncation coding" Journal of Electronic Imaging, vol. 22, no. 1, 2013.
14 T. Matsuo and K. Kurosawa, "On parallel hash functions based on block-ciphers," IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, no. 1, pp 67-74, 2004.
15 J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," in Proc. of SPIE 4314, Security and Watermarking of Multimedia Contents III, San Jose, CA, Jan. 2001.
16 M. Goljan, J. Fridrich, and R. Du, "Distortion-free data embedding for images," in Proc. of 4th Int. Workshop on Information Hiding, pp 27-41, 2001.
17 A. van Leest, M. van der Veen, and F. Bruekers, "Reversible image watermarking," in Proc. of 2003 Int. Conf. on Image Processing, vol. 3, pp 731-734, Step. 2003.
18 H. Guo, Y. Li, A. Liu, and S. Jajodi, "A fragile watermarking scheme for detecting malicious modifications of database relations," Information Sciences, vol. 176, no. 10, pp. 1350-1378, 2006.   DOI   ScienceOn
19 C. Qin, C. C. Chang, and P. Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.   DOI   ScienceOn
20 X. Zhang, S.Wang, and G. Feng, "Fragile watermarking scheme with extensive content restoration capability," in Proc. of the 8th Int. Workshop on Digital Watermarking, pp. 268-278, 2009.
21 Anthony T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, " Fragile watermarking based on encoding of the zeros of the transform," IEEE Transactions on Information Forensic and Security, vol. 3, no. 3, pp. 567-569, Sept. 2008.   DOI   ScienceOn
22 J. Fridrich, "Image watermarking for tamper detection," in Proc. of 1998 Int. Conf. on Image Processing, vol. 2, pp. 404-408, 1998.
23 J. Fridrich, M. Goljan and A. C. Baldoza, "New fragile authentication watermark for images," in Proc. of 2000 Int. Conf. on Image Processing, vol. 1, pp. 446-449, Sept. 2000.
24 G. Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905-910, 1993.   DOI   ScienceOn
25 M. Schneider and S. F. Chang, "A robust content based digital signature for image authentication," in Proc. of 1996 Int. Conf. on Image Processing, vol. 3, pp 227-230, Sept. 1996.
26 J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proc. of 1999 Int. Conf. on Image Processing, vol. 3, pp. 792-796, Oct. 1999.
27 A. Harry, VDM Specification of The MD4 Message Digest Algorithm, National Physical Laboratory, Teddington, 1992.