Cargando…

A recoverable AMBTC authentication scheme using similarity embedding strategy

In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks ar...

Descripción completa

Detalles Bibliográficos
Autores principales: Hong, Wien, Zhou, Xiaoyu, Lou, Der-Chyuan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6392470/
https://www.ncbi.nlm.nih.gov/pubmed/30811472
http://dx.doi.org/10.1371/journal.pone.0212802
_version_ 1783398480978378752
author Hong, Wien
Zhou, Xiaoyu
Lou, Der-Chyuan
author_facet Hong, Wien
Zhou, Xiaoyu
Lou, Der-Chyuan
author_sort Hong, Wien
collection PubMed
description In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks are only recovered by their means, causing an unpleasant mosaic-like appearance. The proposed method classifies image blocks into groups according to their similarities, and the group information is recorded for the recovery purpose. The multiple copies of the group information are scrambled and embedded into the bitmap of smooth blocks. The dominant portions of quantization levels are adjusted to generate a set of authentication code candidates. The codes with the minimal distortion are embedded into the least significant bits (LSBs) of the quantization levels. The tampered blocks can be recovered by averaging those untampered ones with the same index. The experimental results show that the proposed method not only achieves an excellent marked image quality and detectability, but also offers a satisfactory recovered result.
format Online
Article
Text
id pubmed-6392470
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-63924702019-03-08 A recoverable AMBTC authentication scheme using similarity embedding strategy Hong, Wien Zhou, Xiaoyu Lou, Der-Chyuan PLoS One Research Article In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks are only recovered by their means, causing an unpleasant mosaic-like appearance. The proposed method classifies image blocks into groups according to their similarities, and the group information is recorded for the recovery purpose. The multiple copies of the group information are scrambled and embedded into the bitmap of smooth blocks. The dominant portions of quantization levels are adjusted to generate a set of authentication code candidates. The codes with the minimal distortion are embedded into the least significant bits (LSBs) of the quantization levels. The tampered blocks can be recovered by averaging those untampered ones with the same index. The experimental results show that the proposed method not only achieves an excellent marked image quality and detectability, but also offers a satisfactory recovered result. Public Library of Science 2019-02-27 /pmc/articles/PMC6392470/ /pubmed/30811472 http://dx.doi.org/10.1371/journal.pone.0212802 Text en © 2019 Hong et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Hong, Wien
Zhou, Xiaoyu
Lou, Der-Chyuan
A recoverable AMBTC authentication scheme using similarity embedding strategy
title A recoverable AMBTC authentication scheme using similarity embedding strategy
title_full A recoverable AMBTC authentication scheme using similarity embedding strategy
title_fullStr A recoverable AMBTC authentication scheme using similarity embedding strategy
title_full_unstemmed A recoverable AMBTC authentication scheme using similarity embedding strategy
title_short A recoverable AMBTC authentication scheme using similarity embedding strategy
title_sort recoverable ambtc authentication scheme using similarity embedding strategy
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6392470/
https://www.ncbi.nlm.nih.gov/pubmed/30811472
http://dx.doi.org/10.1371/journal.pone.0212802
work_keys_str_mv AT hongwien arecoverableambtcauthenticationschemeusingsimilarityembeddingstrategy
AT zhouxiaoyu arecoverableambtcauthenticationschemeusingsimilarityembeddingstrategy
AT louderchyuan arecoverableambtcauthenticationschemeusingsimilarityembeddingstrategy
AT hongwien recoverableambtcauthenticationschemeusingsimilarityembeddingstrategy
AT zhouxiaoyu recoverableambtcauthenticationschemeusingsimilarityembeddingstrategy
AT louderchyuan recoverableambtcauthenticationschemeusingsimilarityembeddingstrategy