Abstract
We propose a novel hybrid image authentication scheme to protect the integrity of images compressed by absolute moment block truncation coding (AMBTC). In this paper, we use a hybrid strategy to embed the authentication codes using AMBTC that at the same time improves the embedding efficiency. All blocks of a compressed image are classified into two groups, smooth and complex, which have different characteristics and may suit different embedding methods. For smooth blocks, the authentication code will be embedded into the bitmap (BM) of each block. For complex blocks, the authentication code will be embedded into quantization levels of each block according to a reference table. In contrast to the previous approach, the hybrid strategy allows for a high utilization of blocks that have high embedding efficiency for embedding, thus giving a significantly improved embedding capacity than the previous approach. The performance is evaluated experimentally to demonstrate that our proposed scheme provides improved image quality and is less vulnerable to tampering compared with existing methods.



















Similar content being viewed by others
References
Abdallah EE, Hamza AB, Bhattacharya P (2006) A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition. Proceedings of the 18th International Conference on Pattern Recognition, vol. 3. pp 673–676
Abdallah EE, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms. J Electronic Imaging 16(3):033020
Ahmed F, Siyal MY (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90:1456–1470
Blakley GR, Borosh I (1979) Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Pergamon Press Ltd., Great Britain
Chuang JC, Hu YC (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 22(5):440–449
Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342
Fränti P, Nevalainen O, Kaukoranta T (1994) Compression of digital images by block truncation coding: a survey. Comput J 37(4):308–332
Fridrich J (1998) Image watermarking for tamper detection. Proceedings of the ICIP’98, Chicago, USA
Fridrich J (1998) Methods for tamper detecting in digital images. Proceedings of the 6th IEEE international workshop on intelligent signal processing and communication systems, Melbourne, Australia
Fridrich J, Goljan M, Du R (2001) Invertible authentication. Proceedings of the SPIE, security and watermarking of multimedia contents, San Jose, California
Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910
Goljan M, Fridrich J, Du R (2001) Distortion-free data embedding for images. Proceedings of the 4th international workshop on information hiding. pp 27–41
Haouzia A, Noumeir R (2007). Methods for image authentication: a survey. Springer Science + Business Media, LLC
Harry A (1992) VDM specification of the MD4 message digest algorithm. Nat Phys Lab Teddington, UK, NPL DITC 204/92
Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. J Electronic Imaging 22(1):013012
Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int J Secur Appl 7(3):11–32
Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Leest A, Veen M, Bruekers F (2003) Reversible image watermarking. Proceedings of the ICIP’03, vol 2. pp 731–734
Lema MD, Mitchell OR (1984) Absolute moment block truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157
Lie WN, Lin GS, Chen SL (2006) Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. IEEE Trans Inf Forensic 1(3):330–341
Lin CY, Chang SF (2001) A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Technol 11(2):153–168
Matsuo T, Kaoru K (2004) On parallel hash functions based on block-ciphers. Proc IEICE Trans Fundam Electron Commun Comput Sci 67–74
Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200
Rabbani M, Jones PW (1991) Digital image compression techniques. SPIE Optical Engineering Press, Bellingham
Schneider M, Chang SF (1996) A robust content based digital signature for image authentication. Proc IEEE Int Conf Image Process 227–230
Whitfield D, Hellman ME (1977) Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74–84
Wong PW (1998) A watermark for image integrity and ownership verification. Proceedings of IS&T PIC Conference, Portland
Wong PW (1998) A public key watermark for image verification and authentication. Proceedings of ICIP, Chicago
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601
Acknowledgments
This work was supported in part by Ministry of Science and Technology under the Grant MOST 103-2632-E-126-001-MY3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lin, CC., Huang, Y. & Tai, WL. A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimed Tools Appl 76, 463–488 (2017). https://doi.org/10.1007/s11042-015-3059-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3059-6