Skip to main content
Log in

An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The existing image authentication methods for absolute moment block truncation coding (AMBTC) modify the bits of quantitation levels or bitmaps to embed the authentication code (AC). However, the modification of the bits in these methods is equivalent to the LSB replacement, which may introduce undesirable distortions. Besides, the modification of bitmap for embedding AC reduces the image quality significantly, especially at image edges. Moreover, the existing methods might not be able to detect some special modifications to the marked image. In this paper, we propose an efficient authentication method for the AMBTC compressed image. AC is obtained from the bitmap and the location information, and is embedded into the quantization levels using the adaptive pixel pair matching (APPM) technique. Since the bitmap is unchanged and the APPM embedment is efficient, a high image quality can be achieved. The experimental results reveal that the proposed method not only significantly reduces the distortion caused by embedding but also provides a better authentication result when compared to the prior state-of-art works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure Fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  2. Chen J, Chen TS, Cheng CY (2005) New image tampering detection and recovery system of JPEG2000 region of interest area. The Imaging Science Journal 53(1):12–19

    Article  Google Scholar 

  3. Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. Journal of Internet Technology 18(2):91–98

    Google Scholar 

  4. Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

  5. Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy Search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11(12):2706–2716

    Article  Google Scholar 

  6. Fu Z, Huang F, Sun X, Vasilakos AV, Yang CN Enabling semantic Search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2622697

  7. Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015) Incremental learning for ν-support vector regression. Neural Netw 67:140–150

    Article  Google Scholar 

  8. Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Transactions on Neural Networks and Learning Systems 26(7):1403–1416

    Article  MathSciNet  Google Scholar 

  9. B. Gu, X. Sun, and V.S. Sheng, Structural Minimax Probability Machine, IEEE Transactions on Neural Networks and Learning System, pp. 1–11, 2016.

  10. Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473–489

    Article  Google Scholar 

  11. Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics and Security 7(1):176–184

    Article  Google Scholar 

  12. Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf Sci 308:140–154

    Article  Google Scholar 

  13. Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. Journal of Electronic Imaging 22(1):013012–013012

    Article  Google Scholar 

  14. Kong Y, Zhang M, Ye D (2016) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123–132

    Article  Google Scholar 

  15. Lee CF, Chen KN, Chang CC, Tsai MC (2011) A hierarchical Fragile watermarking with VQ index recovery. J Multimed 6(3):277–284

    Google Scholar 

  16. Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  17. Li J, Li X, Yang B, Sun X (Mar. 2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507–518

    Article  Google Scholar 

  18. Lin CC, Huang Y, Tai WL (2014) A high-quality image authentication scheme for AMBTC-compressed images. KSII Transactions on Internet and Information Systems 8(12):4588–4603

  19. Lin CC, Huang Y, Tai WL (2015) A novel hybrid image authentication scheme for AMBTC-compressed images. In: Shi YQ, Kim H, Pérez-González F, Yang CN (eds) Digital-forensics and watermarking. IIWDW 2014. Lecture Notes in Computer Science, vol 9023. Springer, Cham, pp 433–443

  20. Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a Heterogeneous cloud environment. Security and Communication Networks 9(17):4002–4012

    Article  Google Scholar 

  21. Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39

    Article  Google Scholar 

  22. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press

  23. Mielikainen J (2006) LSB matching revisited. IEEE Signal Processing Letters 13(5):285–287

    Article  Google Scholar 

  24. Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity Multiview video coding. IEEE Trans Broadcast 61(2):166–176

    Article  Google Scholar 

  25. Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent 40:516–524

    Article  Google Scholar 

  26. Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in Heterogeneous wireless Communication Networks. China Communications 13(7):108–116

    Article  Google Scholar 

  27. The USC-SIPI Image Database. Available: http://sipi.usc.edu/database/.

  28. Tian Q, Chen S (2017) Cross-Heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238:286–295

    Article  Google Scholar 

  29. Tsai PY, Hu YC, Chang CC (2005) A novel image authentication scheme based on Quadtree segmentation. The Imaging Science Journal 53(3):149–162

    Article  Google Scholar 

  30. J. Wang, T. Li, Y.Q. Shi, S. Lian, and J. Ye, Forensics Feature Analysis in Quaternion Wavelet Domain for Distinguishing Photographic Images and Computer Graphics, Multimedia Tools and Applications, pp. 1–17, 2016.

  31. C.M. Wu, Y.C. Hu, K.Y. Liu, and J.C. Chuang, A Novel Active Image Authentication Scheme for Block Truncation Coding, Int. J. Signal Process, Image Process. Pattern Recognit, vol. 7, no. 5, pp. 13–26, 2014.

  32. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291

    Article  Google Scholar 

  33. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked Search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352

    Article  Google Scholar 

  34. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947–1962

    Article  Google Scholar 

  35. Yuan C, Sun X, LV R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications 13(7):60–65

    Article  Google Scholar 

  36. Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. Journal of Internet Technology 18(2):209–216

    Google Scholar 

  37. Zhang X, Wang S (2006) Efficient Steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  38. Zhang Y, Sun X, Wang B (2016) Efficient algorithm for K-barrier coverage based on integer linear programming. China Communications 13(7):16–23

    Article  Google Scholar 

  39. Zhong H, Liu H, Chang CC, Lin CC (2016) A novel Fragile watermark-based image authentication scheme for AMBTC-compressed images. Journal of Information Hiding and Multimedia Signal Processing 7(2):2073–4212

    Google Scholar 

  40. Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12(1):48–63

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meijin Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, W., Chen, M., Chen, T.S. et al. An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multimed Tools Appl 77, 4677–4695 (2018). https://doi.org/10.1007/s11042-017-4899-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4899-z

Keywords

Navigation