A Novel Tamper Detection and Image Recovery Technique for Color Image Demosaicking

  • Yu-Chen HuEmail author
  • Pei-Jung Wu
  • Chia-Mei Chen
  • Yi-Hung Liu
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 109)


In this paper, we designed an image integrity protection technique for color image demosaicking. In the proposed technique, the authentication codes are generated based on the random values induced by the random number seed. The recovery codes are generated by compressing the demosaicked image using the block truncation coding technique. The authentication codes and the recovery codes are then embedded into the host image to provide the image integrity protection. The experimental results show that the tampered areas of a modified image can be clearly detected. In addition, the tampered areas in the modified image can be roughly recovered if needed.


Image authentication Tamper detection Image recovery Image demosaicking Block truncation coding 



This research was supported by the National Science Council, Taipei, Taiwan, R.O.C. under contract MOST 106-2410-H-126-006-MY2.


  1. 1.
    Bartolini, F., Tefas, A., Bami, M., Pitas, I.: Image authentication techniques for surveillance applications. Proc. IEEE 89(10), 1403–1418 (2001)CrossRefGoogle Scholar
  2. 2.
    Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)CrossRefGoogle Scholar
  3. 3.
    Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRefGoogle Scholar
  4. 4.
    Zhang, X.P., Qian, Z.X., Ren, Y.L., Feng, G.R.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)CrossRefGoogle Scholar
  5. 5.
    Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011)CrossRefGoogle Scholar
  6. 6.
    Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto Electron. Rev. 21(1), 137–146 (2013)CrossRefGoogle Scholar
  7. 7.
    Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on AMBTC. J. Electron. Imaging 22(1), 013012 (2013)CrossRefGoogle Scholar
  8. 8.
    Bayer, B.E.: Color imaging array. U.S. Patent No. 3 971 065 (1976)Google Scholar
  9. 9.
    Pei, S.C., Tam, I.K.: Effective color interpolation in CCD color filter arrays using signal correlation. IEEE Trans. Circuits Syst. Video Technol. 13(6), 503–513 (2003)CrossRefGoogle Scholar
  10. 10.
    Menon, D., Calvagno, G.: Color image demosaicking: an overview. Sig. Process. Image Commun. 26(7–8), 518–533 (2011)CrossRefGoogle Scholar
  11. 11.
    Hu, Y.C., Chen, W.L., Hung, C.H.: A novel image authentication technique for color image demosaicking. In: Proceedings of 2014 International Conference on Information Technology and Management Engineering (ITME 2014), Hong Kong, 26–27 April 2014 (2014)Google Scholar
  12. 12.
    Hu, Y.C., Chen, W.L., Lo, C.C.: Probability-based reversible image authentication scheme for image demosaicking. Future Gener. Comput. Syst. 62(C), 92–103 (2016)CrossRefGoogle Scholar
  13. 13.
    Delp, E.J., Mitchell, O.R.: Image compression using block truncation coding. IEEE Trans. Commun. 27(9), 1335–1342 (1979)CrossRefGoogle Scholar
  14. 14.
    Lema, M.D., Mitchell, O.R.: Absolute moment block truncation coding and its application to color image. IEEE Trans. Commun. 32(10), 1148–1157 (1984)CrossRefGoogle Scholar
  15. 15.
    Hu, Y.C., Chang, I.C., Liu, K.Y., Hung, C.L.: Improved color image coding schemes based on single bit map block truncation coding. Opt. Eng. 53(9), 093104 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Yu-Chen Hu
    • 1
    Email author
  • Pei-Jung Wu
    • 1
  • Chia-Mei Chen
    • 2
  • Yi-Hung Liu
    • 3
  1. 1.Providence UniversityTaichungTaiwan, R.O.C.
  2. 2.National Sun Yat-Sen UniversityKaohsiungTaiwan, R.O.C.
  3. 3.Zhejiang University of TechnologyZhejiangChina

Personalised recommendations