Skip to main content
Log in

A novel hybrid image authentication scheme based on absolute moment block truncation coding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We propose a novel hybrid image authentication scheme to protect the integrity of images compressed by absolute moment block truncation coding (AMBTC). In this paper, we use a hybrid strategy to embed the authentication codes using AMBTC that at the same time improves the embedding efficiency. All blocks of a compressed image are classified into two groups, smooth and complex, which have different characteristics and may suit different embedding methods. For smooth blocks, the authentication code will be embedded into the bitmap (BM) of each block. For complex blocks, the authentication code will be embedded into quantization levels of each block according to a reference table. In contrast to the previous approach, the hybrid strategy allows for a high utilization of blocks that have high embedding efficiency for embedding, thus giving a significantly improved embedding capacity than the previous approach. The performance is evaluated experimentally to demonstrate that our proposed scheme provides improved image quality and is less vulnerable to tampering compared with existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Abdallah EE, Hamza AB, Bhattacharya P (2006) A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition. Proceedings of the 18th International Conference on Pattern Recognition, vol. 3. pp 673–676

  2. Abdallah EE, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms. J Electronic Imaging 16(3):033020

    Article  Google Scholar 

  3. Ahmed F, Siyal MY (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90:1456–1470

    Article  MATH  Google Scholar 

  4. Blakley GR, Borosh I (1979) Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Pergamon Press Ltd., Great Britain

    MATH  Google Scholar 

  5. Chuang JC, Hu YC (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 22(5):440–449

    Article  Google Scholar 

  6. Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

  7. Fränti P, Nevalainen O, Kaukoranta T (1994) Compression of digital images by block truncation coding: a survey. Comput J 37(4):308–332

    Article  Google Scholar 

  8. Fridrich J (1998) Image watermarking for tamper detection. Proceedings of the ICIP’98, Chicago, USA

  9. Fridrich J (1998) Methods for tamper detecting in digital images. Proceedings of the 6th IEEE international workshop on intelligent signal processing and communication systems, Melbourne, Australia

  10. Fridrich J, Goljan M, Du R (2001) Invertible authentication. Proceedings of the SPIE, security and watermarking of multimedia contents, San Jose, California

  11. Friedman G (1993) The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910

    Article  Google Scholar 

  12. Goljan M, Fridrich J, Du R (2001) Distortion-free data embedding for images. Proceedings of the 4th international workshop on information hiding. pp 27–41

  13. Haouzia A, Noumeir R (2007). Methods for image authentication: a survey. Springer Science + Business Media, LLC

  14. Harry A (1992) VDM specification of the MD4 message digest algorithm. Nat Phys Lab Teddington, UK, NPL DITC 204/92

  15. Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. J Electronic Imaging 22(1):013012

    Article  Google Scholar 

  16. Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int J Secur Appl 7(3):11–32

    Google Scholar 

  17. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  18. Leest A, Veen M, Bruekers F (2003) Reversible image watermarking. Proceedings of the ICIP’03, vol 2. pp 731–734

  19. Lema MD, Mitchell OR (1984) Absolute moment block truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  20. Lie WN, Lin GS, Chen SL (2006) Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. IEEE Trans Inf Forensic 1(3):330–341

    Article  Google Scholar 

  21. Lin CY, Chang SF (2001) A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Technol 11(2):153–168

    Article  Google Scholar 

  22. Matsuo T, Kaoru K (2004) On parallel hash functions based on block-ciphers. Proc IEICE Trans Fundam Electron Commun Comput Sci 67–74

  23. Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200

    Article  Google Scholar 

  24. Rabbani M, Jones PW (1991) Digital image compression techniques. SPIE Optical Engineering Press, Bellingham

    Book  Google Scholar 

  25. Schneider M, Chang SF (1996) A robust content based digital signature for image authentication. Proc IEEE Int Conf Image Process 227–230

  26. Whitfield D, Hellman ME (1977) Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74–84

    Article  Google Scholar 

  27. Wong PW (1998) A watermark for image integrity and ownership verification. Proceedings of IS&T PIC Conference, Portland

  28. Wong PW (1998) A public key watermark for image verification and authentication. Proceedings of ICIP, Chicago

  29. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported in part by Ministry of Science and Technology under the Grant MOST 103-2632-E-126-001-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Liang Tai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, CC., Huang, Y. & Tai, WL. A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimed Tools Appl 76, 463–488 (2017). https://doi.org/10.1007/s11042-015-3059-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3059-6

Keywords