Abstract
The existing image authentication methods for absolute moment block truncation coding (AMBTC) modify the bits of quantitation levels or bitmaps to embed the authentication code (AC). However, the modification of the bits in these methods is equivalent to the LSB replacement, which may introduce undesirable distortions. Besides, the modification of bitmap for embedding AC reduces the image quality significantly, especially at image edges. Moreover, the existing methods might not be able to detect some special modifications to the marked image. In this paper, we propose an efficient authentication method for the AMBTC compressed image. AC is obtained from the bitmap and the location information, and is embedded into the quantization levels using the adaptive pixel pair matching (APPM) technique. Since the bitmap is unchanged and the APPM embedment is efficient, a high image quality can be achieved. The experimental results reveal that the proposed method not only significantly reduces the distortion caused by embedding but also provides a better authentication result when compared to the prior state-of-art works.










Similar content being viewed by others
References
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure Fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Chen J, Chen TS, Cheng CY (2005) New image tampering detection and recovery system of JPEG2000 region of interest area. The Imaging Science Journal 53(1):12–19
Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. Journal of Internet Technology 18(2):91–98
Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342
Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy Search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11(12):2706–2716
Fu Z, Huang F, Sun X, Vasilakos AV, Yang CN Enabling semantic Search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2622697
Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015) Incremental learning for ν-support vector regression. Neural Netw 67:140–150
Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Transactions on Neural Networks and Learning Systems 26(7):1403–1416
B. Gu, X. Sun, and V.S. Sheng, Structural Minimax Probability Machine, IEEE Transactions on Neural Networks and Learning System, pp. 1–11, 2016.
Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473–489
Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics and Security 7(1):176–184
Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf Sci 308:140–154
Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. Journal of Electronic Imaging 22(1):013012–013012
Kong Y, Zhang M, Ye D (2016) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123–132
Lee CF, Chen KN, Chang CC, Tsai MC (2011) A hierarchical Fragile watermarking with VQ index recovery. J Multimed 6(3):277–284
Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157
Li J, Li X, Yang B, Sun X (Mar. 2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507–518
Lin CC, Huang Y, Tai WL (2014) A high-quality image authentication scheme for AMBTC-compressed images. KSII Transactions on Internet and Information Systems 8(12):4588–4603
Lin CC, Huang Y, Tai WL (2015) A novel hybrid image authentication scheme for AMBTC-compressed images. In: Shi YQ, Kim H, Pérez-González F, Yang CN (eds) Digital-forensics and watermarking. IIWDW 2014. Lecture Notes in Computer Science, vol 9023. Springer, Cham, pp 433–443
Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a Heterogeneous cloud environment. Security and Communication Networks 9(17):4002–4012
Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press
Mielikainen J (2006) LSB matching revisited. IEEE Signal Processing Letters 13(5):285–287
Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity Multiview video coding. IEEE Trans Broadcast 61(2):166–176
Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent 40:516–524
Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in Heterogeneous wireless Communication Networks. China Communications 13(7):108–116
The USC-SIPI Image Database. Available: http://sipi.usc.edu/database/.
Tian Q, Chen S (2017) Cross-Heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238:286–295
Tsai PY, Hu YC, Chang CC (2005) A novel image authentication scheme based on Quadtree segmentation. The Imaging Science Journal 53(3):149–162
J. Wang, T. Li, Y.Q. Shi, S. Lian, and J. Ye, Forensics Feature Analysis in Quaternion Wavelet Domain for Distinguishing Photographic Images and Computer Graphics, Multimedia Tools and Applications, pp. 1–17, 2016.
C.M. Wu, Y.C. Hu, K.Y. Liu, and J.C. Chuang, A Novel Active Image Authentication Scheme for Block Truncation Coding, Int. J. Signal Process, Image Process. Pattern Recognit, vol. 7, no. 5, pp. 13–26, 2014.
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked Search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340–352
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947–1962
Yuan C, Sun X, LV R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications 13(7):60–65
Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. Journal of Internet Technology 18(2):209–216
Zhang X, Wang S (2006) Efficient Steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Zhang Y, Sun X, Wang B (2016) Efficient algorithm for K-barrier coverage based on integer linear programming. China Communications 13(7):16–23
Zhong H, Liu H, Chang CC, Lin CC (2016) A novel Fragile watermark-based image authentication scheme for AMBTC-compressed images. Journal of Information Hiding and Multimedia Signal Processing 7(2):2073–4212
Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12(1):48–63
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hong, W., Chen, M., Chen, T.S. et al. An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multimed Tools Appl 77, 4677–4695 (2018). https://doi.org/10.1007/s11042-017-4899-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4899-z