Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding

  • Kuo Lung Hung
  • Chin-Chen Chang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


Digital imagery is an important medium in information processing in the digital era. However, a major problem in information processing is that digital images can be forged easily. If this problem cannot be alleviated, the popularization of digital imagery will be decreased. Hence, in recent years, a few tamper proofing or image authentication techniques have been proposed to deal with this problem. In this paper, a new recoverable image authentication technique is proposed. Our method employs a very low bit-rated compression method called irregular sampling coding to compress the image. The compressed code is then randomly embedded into the original image using the digital watermarking technique. Since the image is highly compressed, it can be used to detect and recover the tampered-with information. Experimental results show that the proposed tamper proofing technique can effectively detect and recover the modified image. In addition, the experiments also show that the proposed technique is robust. Even though the image is 90%cropped or is highly compressed using JPEG, the quality of the recovered image is acceptable. The proposed method is therefore an effective, robust and recoverable tamper proofing technique.


Original Image Discrete Cosine Transform JPEG Compression Digital Watermark Inverse Discrete Cosine Transform 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Eldar, Y., Lindenbaum, M., Porat, M., Zeevi, Y.Y.: The farthest point strategy for progressive image sampling. IEEE Trans. Image Processing 6(9), 1305–1315 (1997)CrossRefGoogle Scholar
  2. 2.
    Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)CrossRefGoogle Scholar
  3. 3.
    Hung, K.L., Chang, C.C., Chen, T.S.: Secure discrete cosine transform based technique for recoverable tamper proofing. Optical Engineering 40(9), 1950–1958 (2001)CrossRefGoogle Scholar
  4. 4.
    Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167–1180 (1999)CrossRefGoogle Scholar
  5. 5.
    Ramponi, G., Carato, S.: An adaptive irregular sampling algorithm and its application to image coding. Image and Vision Computing 19, 451–460 (2001)CrossRefGoogle Scholar
  6. 6.
    Lu, C.S., Liao, H.Y.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Processing 10(10), 1579–1592 (2001)zbMATHCrossRefGoogle Scholar
  7. 7.
    Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 227–230 (1996)Google Scholar
  8. 8.
    Swanson, M.D., Zhu, B., Tewfik, A.H.: Transparent robust image watermarking. In: Proc. ICIP 1996, pp. 211–214 (1996)Google Scholar
  9. 9.
    Walton, S.: Image authentication for a slippery new age. Dr. Dobb’s J. 20, 18–26 (1995)Google Scholar
  10. 10.
    Wolfgan, R.B., Delp, E.J.: A watermark for digital images. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219–222 (1996)Google Scholar
  11. 11.
    Tsai, C.S., Chang, C.C., Chen, T.S., Chen, M.H.: Embedding robust gray-level watermarks in an image using discrete cosine transform. Distributed Multimedia Database: Techniques and Applications (to appear)Google Scholar
  12. 12.
    Fridrich, J., Goljan, M.: Protection of digital images using self embedding, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology (May 14, 1999)Google Scholar
  13. 13.
    Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: ICIP 1999, Kobe, Japan, pp. 25–28 (1999)Google Scholar
  14. 14.
    Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Proceedings of the SPIE – The International Society for Optical Engineering, vol. 3657 (Security and Watermarking of Multimedia Contents), San Jose, CA, USA, pp. 386–396 (1999)Google Scholar
  15. 15.
    Mobasseri, B.G., Evans, A.T.: Content-dependent video authentication by self-watermarking in color space, Security and Watermarking of Multimedia Contents III. In: SPIE Proceedings, vol. 4314, pp. 35–44Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kuo Lung Hung
    • 1
  • Chin-Chen Chang
    • 1
  1. 1.Department of Information Management, Chaoyang Univerity of Technology 

Personalised recommendations