scholarly journals High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images

Symmetry ◽  
2019 ◽  
Vol 11 (8) ◽  
pp. 996 ◽  
Author(s):  
Su ◽  
Chang ◽  
Lin

In this paper, a high-precision image authentication scheme for absolute moment block truncation coding (AMBTC)-compressed images is presented. For each block, two sub-bitmaps are conducted using the symmetrical separation, and the six-bit authentication code is symmetrically assigned to two sub-codes, which is virtually embedded into sub-bitmaps using the matrix encoding later. To overcome distortion caused by modifications to the bitmap, the corresponding to-be-flipped bit-location information is recorded instead of flipping these bits of the bitmap directly. Then, the bit-location information is inserted into quantization levels based on adjusted quantization level matching. In contrast to previous studies, the proposed scheme offers a significantly improved tampering detection ability, especially in the first hierarchical tampering detection without remediation measures, with an average tampering detection rate of up to 98.55%. Experimental results show that our approach provides a more stable and reliable tampering detection performance and sustains an acceptable visual quality.

2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 149515-149526 ◽  
Author(s):  
Chih-Cheng Chen ◽  
Chin-Chen Chang ◽  
Chia-Chen Lin ◽  
Guo-Dong Su

Fractals ◽  
2008 ◽  
Vol 16 (04) ◽  
pp. 287-297 ◽  
Author(s):  
SHIGUO LIAN

In this paper, the fractal features of natural images are used to construct an image authentication scheme, which can detect whether an image is maliciously tampered (cutting, wiping, modification, etc.) or not and can even locate the tampered regions. For the original image, the fractal transformation is applied to each of the image blocks, and some of the transformation parameters are quantized and used as the authentication code. The authentication code can be stored or transmitted secretly. To authenticate an image, the new authentication code is computed from the image with the similar method, and then compared with the stored or received code. A metric is proposed to decide whether an image block is tampered or not. Comparative experiments show that the authentication scheme can detect malicious tampering, is robust against such common signal processing as JPEG compression, fractal coding, adding noise or filtering, and thus, obtains competent performances compared with existing image authentication schemes.


2013 ◽  
Vol 21 (1) ◽  
Author(s):  
Y. Hu ◽  
W. Chen ◽  
C. Lo ◽  
C. Wu

AbstractA novel image authentication scheme for the compressed images of block truncation coding (BTC) is proposed in this paper. In the proposed scheme, 1-bit authentication data is generated from the quantization levels of each image block. Multiple block permutations are generated by using the random sequences induced by the selected random number seeds. Multiple copies of the authenticaiton data are embedded into the bit maps of BTC-compressed image blocks based on the block permutations. Experimental results show that the proposed scheme achieves good detecting accuracy while keeping good image quatiy of the embedded image.


Author(s):  
Thai-Son Nguyen ◽  
Phuoc-Hung Vo

<span>Reversible image authentication scheme is a technique that detects tampered areas in images and allows them to be reconstructed to their original version without any distortion. In this article, a new, reversible, image authentication scheme based on prediction error expansion is proposed for digital images. The proposed scheme classifies the host image into smooth blocks and complex blocks. Then, an authentication code that is created randomly with a seed is embedded adaptively into each image block. Experimental results showed that our proposed scheme achieves the high accuracy of tamper detection and preserved high image quality. Moreover, the proposed scheme achieved the reversibility, which is needed for some special applications, such as fine artwork, military images, and medical images. </span>


2021 ◽  
pp. 1-11
Author(s):  
Kusan Biswas

In this paper, we propose a frequency domain data hiding method for the JPEG compressed images. The proposed method embeds data in the DCT coefficients of the selected 8 × 8 blocks. According to the theories of Human Visual Systems  (HVS), human vision is less sensitive to perturbation of pixel values in the uneven areas of the image. In this paper we propose a Singular Value Decomposition based image roughness measure (SVD-IRM) using which we select the coarse 8 × 8 blocks as data embedding destinations. Moreover, to make the embedded data more robust against re-compression attack and error due to transmission over noisy channels, we employ Turbo error correcting codes. The actual data embedding is done using a proposed variant of matrix encoding that is capable of embedding three bits by modifying only one bit in block of seven carrier features. We have carried out experiments to validate the performance and it is found that the proposed method achieves better payload capacity and visual quality and is more robust than some of the recent state-of-the-art methods proposed in the literature.


Sign in / Sign up

Export Citation Format

Share Document