PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A novel tamper detection scheme for BTC-compressed images

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A novel image authentication scheme for the compressed images of block truncation coding (BTC) is proposed in this paper. In the proposed scheme, 1-bit authentication data is generated from the quantization levels of each image block. Multiple block permutations are generated by using the random sequences induced by the selected random number seeds. Multiple copies of the authenticaiton data are embedded into the bit maps of BTC-compressed image blocks based on the block permutations. Experimental results show that the proposed scheme achieves good detecting accuracy while keeping good image quatiy of the embedded image.
Rocznik
Strony
137--146
Opis fizyczny
Bibliogr. 18 poz., rys., il., wykr.
Twórcy
autor
  • Department of Computer Science and Information Management, Providence University, 200 Chung Chi Rd., Taichung 43301, Republic of China (Taiwan)
autor
  • Department of Computer Science and Information Management, Providence University, 200 Chung Chi Rd., Taichung 43301, Republic of China (Taiwan)
autor
  • Department of Computer Science and Information Engineering, Providence University, 200 Chung Chi Rd., Taichung 43301, Republic of China (Taiwan)
autor
  • Department of Electronic Engineering, Chung Yuan Christian University, Chung-Li 32023, Republic of China (Taiwan)
Bibliografia
  • 1. E. J. Delp and O. R. Mitcell, „Image compression using block truncation coding”, IEEE T. Commun. 27, 1335–1342 (1979).
  • 2. M. D. Lema and O. R. Mitchell, „Absolute moment block truncation coding and its application to colour image”, IEEE T. Commun. 32, 1148–1157 (1984).
  • 3. Y. C. Hu, B. H. Su, and P. Y. Tsai, „Colour image coding scheme using absolute moment block truncation coding and block prediction technique”, Imaging Sci. J. 56, 254–270, (2008).
  • 4. Y. Yang, Q. Chen, and Y. Wan, „A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation”, AEUE – Int. J. Electron. Commun. 65, 576–581 (2011).
  • 5. Y. C. Hu, W. L. Chen, C. C. Lo, and J. C. Chung, „An improved vector quantization scheme for grayscale image compression”, Opto-Electron. Rev. 20, 187–193 (2012).
  • 6. F. Bartolini, A. Tefas, M. Bami, and I. Pitas, „Image authentication techniques for surveillance applications”, Proc. IEEE 89, 1403-418 (2001).
  • 7. D. C. Lou and J. L. Liu, „Fault resilient and compression tolerant digital signature for image authentication”, IEEE T. Consum. Electr. 46, 31–39 (2000).
  • 8. L. Xie, G. R. Arce and R. F. Graveman, „Approximate image message authentication codes”, IEEE T. Multimedia 3, 242–252 (2001).
  • 9. P. Y. Tsai, Y. C. Hu, and C. C. Chang, „A novel image authentication scheme based on quadtree segmentation”, Imaging Sci. J. 53, 149–162 (2005).
  • 10. S. Ababneh, R. Ansari, and A. Khokhar, „Iterative compensation schemes for multimedia content authentication”, J. Vis. Commun. Image R. 20, 303–311 (2009).
  • 11. C. Y. Lin and S. F. Chang, „A robust image authentication method distinguish JPEG compression from malicious manipulation”, IEEE T. Circ. Syst. Vid. 11, 153–168 (2001).
  • 12. P. W. Wong and N. Memon, „Secret and public key image watermarking schemes for image authentication and ownership verification”, IEEE T. Image Process. 10, 1593–1601, (2001).
  • 13. T. Y. Lee and S. D. Lin, „Dual watermark for image tamper detection and recovery”, Pattern Recogn. 41, 3497–3506, (2008).
  • 14. F. Ahmed and M. Y. Siyal, „A secure and robust hash-based scheme for image authentication”, Signal Process. 90, 1456–1470 (2010).
  • 15. X. Qi and X. Xin, „A quantization-based semi-fragile water-marking scheme for image content authentication”, J. Vis. Commun. Image R. 22, 187–200 (2011).
  • 16. J. C. Chuang and Y. C. Hu, „An adaptive image authentication scheme for vector quantization compressed image”, J. Vis. Commun. Image R. 22, 440–449 (2011).
  • 17. C. S. Chan, „An image authentication method by applying Hamming code on rearranged bits”, Pattern Recogn. Lett. 32, 1679–1690 (2011).
  • 18. C. Li, Y. Wang, B. Ma, and Z. Zhang, „Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme”, Comp. Stand. Inter. 34, 367–379 (2012).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BWAD-0033-0010
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.