scholarly journals An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 133746-133761
Author(s):  
Wien Hong ◽  
Jie Wu ◽  
Der-Chyuan Lou ◽  
Xiaoyu Zhou ◽  
Jeanne Chen
Symmetry ◽  
2019 ◽  
Vol 11 (8) ◽  
pp. 996 ◽  
Author(s):  
Su ◽  
Chang ◽  
Lin

In this paper, a high-precision image authentication scheme for absolute moment block truncation coding (AMBTC)-compressed images is presented. For each block, two sub-bitmaps are conducted using the symmetrical separation, and the six-bit authentication code is symmetrically assigned to two sub-codes, which is virtually embedded into sub-bitmaps using the matrix encoding later. To overcome distortion caused by modifications to the bitmap, the corresponding to-be-flipped bit-location information is recorded instead of flipping these bits of the bitmap directly. Then, the bit-location information is inserted into quantization levels based on adjusted quantization level matching. In contrast to previous studies, the proposed scheme offers a significantly improved tampering detection ability, especially in the first hierarchical tampering detection without remediation measures, with an average tampering detection rate of up to 98.55%. Experimental results show that our approach provides a more stable and reliable tampering detection performance and sustains an acceptable visual quality.


2009 ◽  
Vol 29 (4) ◽  
pp. 950-951
Author(s):  
Xin ZHANG ◽  
Fang-wei LI ◽  
Chun-lan PAN

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


Sign in / Sign up

Export Citation Format

Share Document