An adaptive image authentication scheme for vector quantization compressed image

被引:50
作者
Chuang, Jun-Chou [2 ]
Hu, Yu-Chen [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung 43301, Taiwan
[2] Providence Univ, Dept Comp Sci & Commun Engn, Taichung 43301, Taiwan
关键词
Tamper detection; Image authentication; Watermark; Image compression; Vector quantization; Index table; Random values; Random seed; CODEBOOK SEARCH ALGORITHM; OWNERSHIP; WATERMARK;
D O I
10.1016/j.jvcir.2011.03.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an image authentication scheme which detects illegal modifications for image vector quantization (VQ). In the proposed scheme, the index table is divided into non-overlapping index blocks. The authentication data is generated by using the pseudo random sequence. Our scheme can adaptively determine both the size of the authentication data and the number of the indices in each index block. Then, the selected indices are used to embed the secret data to generate the embedded image. To authenticate the given VQ compressed image, two sets of the authentication data are needed to perform the tamper detection process. One set is generated by using the pseudo random number sequence. The other set is extracted from the compressed image. The experimental results demonstrate that the proposed scheme achieves acceptable image quality of the embedded image while keeping good detecting accuracy. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:440 / 449
页数:10
相关论文
共 26 条
[1]   A secure and robust hash-based scheme for image authentication [J].
Ahmed, Fawad ;
Siyal, M. Y. ;
Abbas, Vali Uddin .
SIGNAL PROCESSING, 2010, 90 (05) :1456-1470
[2]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[3]   An efficient image authentication method based on Hamming code [J].
Chan, Chi-Shiang ;
Chang, Chin-Chen .
PATTERN RECOGNITION, 2007, 40 (02) :681-690
[4]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[5]  
Chang CC, 1998, IEEE T CONSUM ELECTR, V44, P1201
[6]   A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J].
Chen, Wei-Che ;
Wang, Ming-Shi .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :1300-1307
[7]   Probability-based tampering detection scheme for digital images [J].
Hsu, Ching-Sheng ;
Tu, Shu-Fen .
OPTICS COMMUNICATIONS, 2010, 283 (09) :1737-1743
[8]   Efficient greyscale image compression technique based on vector quantization [J].
Hu, Y. C. ;
Chuang, J. C. ;
Lo, C. C. ;
Li, C. Y. .
OPTO-ELECTRONICS REVIEW, 2011, 19 (01) :104-113
[9]   An effective codebook search algorithm for vector quantization [J].
Hu, YC ;
Chang, CC .
IMAGING SCIENCE JOURNAL, 2003, 51 (04) :221-233
[10]   Fast VQ codebook search algorithm for grayscale image coding [J].
Hu, Yu-Chen ;
Su, Bing-Hwang ;
Tsou, Chih-Chiang .
IMAGE AND VISION COMPUTING, 2008, 26 (05) :657-666