Skip to main content
Log in

Tamper detection and image recovery for BTC-compressed images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Al-Qershi OM, Khoo BE (2013) Passive detection of copy-move forgery in digital images: state-of-the art. Forensic Sci Int 231(1–3):284–295

    Article  Google Scholar 

  2. Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739

    Article  MATH  Google Scholar 

  3. Chuang JC, Hu YC (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 22:440–449

    Article  Google Scholar 

  4. Chuang JC, Hu YC, Lo CC, Chen WL (2013) Grayscale image tamper detection and recovery based on vector quantization. Int J Secur Appl 7(6):209–228

    Google Scholar 

  5. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimedia Tools Appl 39(1):1–46

    Article  Google Scholar 

  6. He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566

    Article  MATH  Google Scholar 

  7. Hu YC, Chen WL, Lo CC, Wu CM (2013) A novel tamper detection scheme for BTC compressed images. Opto-Electron Rev 21(1):137–146

    Article  Google Scholar 

  8. Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on AMBTC. J Electron Imaging 22(1):013012

    Article  Google Scholar 

  9. Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int J Secur Appl 7(3):11–32

    Google Scholar 

  10. Lee CW, Tsai WH (2013) A data hiding method based on information sharing via PNG images for applications of color imageauthentication and metadata embedding. Signal Process 93(7):2010–2025

    Article  Google Scholar 

  11. Lin CY, Chang SF (2001) A robust image authentication method distinguish JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Technol 11:153–168

    Article  Google Scholar 

  12. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185

    Article  Google Scholar 

  13. Lo CC, Hu YC, Chen WL, Chang IC (2014) Probability-based image authentication scheme for indexed color images. J Electron Imaging 23(3):033003

    Article  Google Scholar 

  14. Nguyen TS, Chang CC, Chung TF (2014) A tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans Internet Inform Syst 8(6):2005–2021

    Article  Google Scholar 

  15. Qian ZX, Feng GR, Zhang XP, Wang SZ (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286

    Article  Google Scholar 

  16. Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  17. Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Appl Signal Process 2002(1):613–621

    Article  MATH  Google Scholar 

  18. Tsai PY, Hu YC, Chang CC (2003) Using set partitioning in hierarchical trees to authenticate digital images. Signal Process Image Commun 18:813–822

    Article  Google Scholar 

  19. Wang SS, Tsai SL (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn 41:701–712

    Article  MATH  Google Scholar 

  20. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601

    Article  MATH  Google Scholar 

  21. Wu CM, Hu YC, Liu KY, Chuang JC (2014) A novel active image authentication scheme for block truncation coding. Int J Signal Process Image Process Pattern Recogn 7(5):13–26

    Google Scholar 

  22. Yang Q, Peng F, Li JT, Long M Image tamper detection based on noise estimation and lacunarity texture. Multimedia Tools and Applications. doi: 10.1007/s11042-015-3079-2

  23. Zhang XP, Wang SZ, Qian ZX, Feng GR (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90(12):3026–3036

    Article  MATH  Google Scholar 

  24. Zhu XZ, Ho ATS, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Providence University, Taichung, Taiwan under contract the National Science Council, Taipei, R.O.C. under contract MOST 103-2410-H-126-009-MY3 and MOST-103-2632-E-126-001MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Chen Hu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, YC., Choo, KK.R. & Chen, WL. Tamper detection and image recovery for BTC-compressed images. Multimed Tools Appl 76, 15435–15463 (2017). https://doi.org/10.1007/s11042-016-3847-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3847-7

Keywords

Navigation