A High-Quality Image Authentication Scheme for AMBTC-compressed Images

نویسندگان

  • Chia-Chen Lin
  • Yuehong Huang
  • Wei-Liang Tai
چکیده

In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images

A novel fragile watermark-based image authentication scheme for images that are compressed by absolute moment block truncation coding (AMBTC) was proposed in this paper. In the proposed scheme, an authentication code is generated by a pseudo random sequence. Subsequently, the authentication code is embedded into both quantization levels and the bit map of each image block for AMBTC-compressed i...

متن کامل

Joint image coding and image authentication based on absolute moment block truncation coding

A joint image coding and image authentication scheme based on absolute moment block truncation coding (AMBTC) is proposed. In the proposed scheme, the authentication data is generated by using the pseudo random sequence. Then, the authentication codes are embedded into the bit maps of AMBTC-compressed image blocks. The embedded bit maps and these quantization levels are further losslessly compr...

متن کامل

High Capacity Reversible Data Hiding in AMBTC-Compressed Images

This paper proposes a high capacity reversible data hiding scheme in images compressed by absolute moment block truncation coding (AMBTC). The quantization levels of compressed blocks are employed as cover media, and some extra confidential data are hidden in it based on a multilevel histogram shifting mechanism. The transmission system preserves the same complexity. Moreover, the reconstructed...

متن کامل

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user’s requirement, with each BTC-compressed image block being used to carry the authentication code using the data...

متن کامل

A High Payload Steganographic Scheme for Compressed Images with Hamming Code

Data hiding schemes in the compressed domain have attracted more attention since the compressed image format is one of the most frequently transmitted formats over the Internet. Specifically, among various compression algorithms, Absolute Moment Block Truncation Coding (AMBTC) is a good choice due to its extremely low complexity and acceptable distortion. In this study, we propose a novel stega...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • TIIS

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2014