Browse > Article
http://dx.doi.org/10.3837/tiis.2014.06.011

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images  

Nguyen, Thai-Son (Department of Information Engineering and Computer Science, Feng Chia University)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University)
Chung, Ting-Feng (Department of Information Engineering and Computer Science, Feng Chia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.6, 2014 , pp. 2005-2021 More about this Journal
Abstract
This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.
Keywords
Block truncation coding (BTC); high-quality image; image authentication; tamper detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Franti, O. Nevalainen and T. Kaukoranta, "Compression of digital images by block truncation coding: a survey," The Computer Journal, vol. 37, no. 4, pp. 308-332, 1994.   DOI   ScienceOn
2 B. C. Dhara and B. Chanda, "Block truncation coding using pattern fitting," Pattern Recognition, vol. 37, no. 11, pp. 2131-2139, 2004.   DOI   ScienceOn
3 B. C. Dhara and B. Chanda, "Color image compression based on block truncation coding using pattern fitting principle," Pattern Recognition, vol. 40, no. 9, pp. 2408-2417, 2007.   DOI   ScienceOn
4 Y. C. Hu, B. H. Su and P. Y. Tsai, "Color image coding scheme using absolute moment block truncation coding and block prediction technique," Imaging Science Journal, vol. 56, no. 5, pp. 254-270, 2008.   DOI   ScienceOn
5 P. Schelkens, A. Munteanu and J. Cornelis, "Wavelet-based compression of medical images: protocols to improve resolution and quality scalability and region-of-interest coding," Future Generation Computer Systems, vol. 15, no. 2, pp. 171-184, 1999.   DOI   ScienceOn
6 V. Bruni, D. Vitulano, "Combined image compression and denoising using wavelets," Signal Processing: Image Communication, vol. 22, no. 1, pp. 86-101, 2007.   DOI   ScienceOn
7 A. M. Rufai, G. Anbarjafari and H. Demirel, "Lossy image compression using singular value decomposition and wavelet difference reduction," Digital Signal Processing, vol. 24, pp. 117-123, January, 2014.   DOI   ScienceOn
8 P. G. Howarda and J. S. Vitter, "Parallel lossless image compression using Huffman and arithmetic coding," Information Processing Letters, vol. 59, no. 2, pp. 65-73, 1996.   DOI   ScienceOn
9 Y. C. Hu and C. C. Chang, "A new lossless compression scheme based on Huffman coding scheme for image compression," Signal Processing: Image Communication, vol. 16, no. 4, pp. 367-372, 2000.   DOI   ScienceOn
10 D. Tsolakis, George E. Tsekouras and J. Tsimikas, "Fuzzy vector quantization for image compression based on competitive agglomeration and a novel codeword migration strategy," Engineering Applications of Artificial Intelligence, vol. 25, no. 6, pp. 1212-1225, 2012.   DOI
11 W. N. Lie, T. C. I. Lin, S. L. Cheng, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques," IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 330-341, 2006.   DOI   ScienceOn
12 T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, pp. 3497-3506, 2008.   DOI
13 F. Ahmed and M. Y. Siyal, "A secure and robust hash-based scheme for image authentication," Signal Processing, vol. 90, pp. 1456-1470, 2010.   DOI   ScienceOn
14 J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image," Journal of Visual Communication and Image Representation, vol. 22, pp. 440-449, 2011.   DOI   ScienceOn
15 Y. C. Hu, W. L. Chen, C. C. Lo, C. M. Wu, "A novel tamper detection scheme for BTC compressed images," Opto-Electronics Review, vol. 21, no. 1, pp. 137-146, 2013.
16 Y. C. Hu, C. C. Lo, C. M. Wu, W. L. Chen, and C. H. Wen, "Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification," International Journal of Security and Its Applications, vol. 7, no. 3, pp. 11-32, 2013.   DOI
17 J. Serra, "Image analysis and mathematical morphology," Academic Press, Inc. Orlando, FL, USA, 1983.
18 X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communication Letters, vol. 10, no. 11, pp. 1-3, 2006.   DOI   ScienceOn
19 Y. C. Hu, C. C. Lo, W. L. Chen, C. H. Wen, "Joint image coding and image authentication based on absolute moment block truncation coding," Journal of Electronic Imaging, vol. 22, no. 1, pp. 1-12, January- March, 2013.
20 C. Qin, C. C. Chang, K. N. Chen, "Adaptive self-recovery for tampered images based on VQ indexing and inpainting," Signal Processing, vol. 93, no. 4, pp. 933-946, 2013.   DOI   ScienceOn
21 P. G. Howard and J. S. Vitter, "New methods for lossless image compression using arithmetic coding," Information Processing & Management, vol. 28, no. 6, pp. 765-779, 1992.   DOI   ScienceOn
22 J. Wu, Z. Xu, G. Jeon, X. Zhang and L. Jiao, "Arithmetic coding for image compression with adaptive weight-context classification," Signal Processing: Image Communication, vol. 28, no.7, pp. 727-735, 2013.   DOI   ScienceOn
23 E. J. Delp and O. R. Mitchell, "Image compression using block truncation coding," IEEE Transactions on Communication, vol. 27, no. 9, pp. 1335-1342, 1979.   DOI
24 M. Lema and O. R. Mitchell, "Absolute moment block truncation coding and its application to color images," IEEE Transactions on Communication, vol. 32, no. 10, pp. 1148-1157, 1984.   DOI
25 C. Qin, C. C. Chang, P. Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.   DOI   ScienceOn
26 M. H. Horng, "Vector quantization using the firefly algorithm for image compression," Expert Systems with Applications, vol. 39, no. 1, pp. 1078-1091, 2012.   DOI   ScienceOn