• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A High-Quality Image Authentication Scheme for AMBTC-compressed Images


Abstract

In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Chia-Chen Lin, Yuehong Huang and Wei-Liang Tai, "A High-Quality Image Authentication Scheme for AMBTC-compressed Images," KSII Transactions on Internet and Information Systems, vol. 8, no. 12, pp. 4588-4603, 2014. DOI: 10.3837/tiis.2014.12.020

[ACM Style]
Lin, C., Huang, Y., and Tai, W. 2014. A High-Quality Image Authentication Scheme for AMBTC-compressed Images. KSII Transactions on Internet and Information Systems, 8, 12, (2014), 4588-4603. DOI: 10.3837/tiis.2014.12.020