A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images
نویسندگان
چکیده
This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user’s requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.
منابع مشابه
A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images
Reversible data hiding is an efficient way for embedding additional data into cover media, which can reversibly recover the original cover media when the additional data is extracted. It has been widely utilized in secure communication and copyright protection. A reversible data hiding scheme imposed on the quantized coefficients of compressed images based on block truncation coding (BTC) is pr...
متن کاملFuzzy Transforms and Fragile Watermarking Tamper Detection on Coded Images
An original image is compressed with fuzzy transforms and is divided in images of sizes 2×2 on which we apply a known fragile watermarking process. A preprocessing phase is considered to determine the better compression rate for the coding process. We test this scheme in tamper detection analysis on a sample of images. The results are good in terms of accuracy for tamper detection with compress...
متن کاملA High-Quality Image Authentication Scheme for AMBTC-compressed Images
In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quant...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملDigital image watermarking scheme for tamper detection & peak signal noise ratio
Digital image fragile watermarking is an information hiding technique which adds the watermark into the host image for authentication .while achieving the high integrity one should not compromise with quality distortion of images. numbers of watermarking schemes exist today for balancing between the tamper detection rate and quality of reconstructed images in propose scheme we aim at maintain h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- TIIS
دوره 8 شماره
صفحات -
تاریخ انتشار 2014