2013
DOI: 10.2478/s11772-013-0078-6
|View full text |Cite
|
Sign up to set email alerts
|

A novel tamper detection scheme for BTC-compressed images

Abstract: A novel image authentication scheme for the compressed images of block truncation coding (BTC) is proposed in this paper. In the proposed scheme, 1-bit authentication data is generated from the quantization levels of each image block. Multiple block permutations are generated by using the random sequences induced by the selected random number seeds. Multiple copies of the authenticaiton data are embedded into the bit maps of BTC-compressed image blocks based on the block permutations. Experimental results show… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…In addition, the search of the optimal threshold for pixel group in BTC had also been proposed [23]. From the literature, some multimedia application based on BTC such as hybrid image coding, [24][25], progressive image transmission [26], data hiding [27][28], and image authentication [29][30][31] had been proposed.…”
Section: Review On Absolute Moment Block Truncation Codingmentioning
confidence: 99%
“…In addition, the search of the optimal threshold for pixel group in BTC had also been proposed [23]. From the literature, some multimedia application based on BTC such as hybrid image coding, [24][25], progressive image transmission [26], data hiding [27][28], and image authentication [29][30][31] had been proposed.…”
Section: Review On Absolute Moment Block Truncation Codingmentioning
confidence: 99%
“…Besides, many studies based on compressed domains have also been proposed, as in [8], To get the recovery of VQ images, a new image steganography scheme is based on traditional VQ and repair technology is proposed. References [9], [10] proposed blockcutting compression (BTC-Compressed) image for image steganography and article [11] further improvements to the work of [9], [10], their steganography is based on the implementation of the compression domain. Also, other steganographic schemes have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…However, forensic schemes faced with the low accuracy and high computation complexity. Since fragile watermarking is very sensitive to modifications, therefore, it is suitable to apply for image authentication [10][11][12][13][14][15][16][17][18] by hiding a watermark into the image. In the receiver side, the watermark is extracted to prove the integrity of the received image.…”
Section: Introductionmentioning
confidence: 99%
“…Besides above mentioned schemes [10][11][12][13][14], many state-of-the-art image authentication schemes based on fragile image watermarking techniques [15][16][17][18][19] have been proposed in the compression domain, i.e., vector quantization (VQ) and block truncation coding (BTC). Chuang and Hu [15] proposed an adaptive image authentication scheme for VQ-compressed images.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation