Cargando…
A recoverable AMBTC authentication scheme using similarity embedding strategy
In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks ar...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6392470/ https://www.ncbi.nlm.nih.gov/pubmed/30811472 http://dx.doi.org/10.1371/journal.pone.0212802 |
_version_ | 1783398480978378752 |
---|---|
author | Hong, Wien Zhou, Xiaoyu Lou, Der-Chyuan |
author_facet | Hong, Wien Zhou, Xiaoyu Lou, Der-Chyuan |
author_sort | Hong, Wien |
collection | PubMed |
description | In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks are only recovered by their means, causing an unpleasant mosaic-like appearance. The proposed method classifies image blocks into groups according to their similarities, and the group information is recorded for the recovery purpose. The multiple copies of the group information are scrambled and embedded into the bitmap of smooth blocks. The dominant portions of quantization levels are adjusted to generate a set of authentication code candidates. The codes with the minimal distortion are embedded into the least significant bits (LSBs) of the quantization levels. The tampered blocks can be recovered by averaging those untampered ones with the same index. The experimental results show that the proposed method not only achieves an excellent marked image quality and detectability, but also offers a satisfactory recovered result. |
format | Online Article Text |
id | pubmed-6392470 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-63924702019-03-08 A recoverable AMBTC authentication scheme using similarity embedding strategy Hong, Wien Zhou, Xiaoyu Lou, Der-Chyuan PLoS One Research Article In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks are only recovered by their means, causing an unpleasant mosaic-like appearance. The proposed method classifies image blocks into groups according to their similarities, and the group information is recorded for the recovery purpose. The multiple copies of the group information are scrambled and embedded into the bitmap of smooth blocks. The dominant portions of quantization levels are adjusted to generate a set of authentication code candidates. The codes with the minimal distortion are embedded into the least significant bits (LSBs) of the quantization levels. The tampered blocks can be recovered by averaging those untampered ones with the same index. The experimental results show that the proposed method not only achieves an excellent marked image quality and detectability, but also offers a satisfactory recovered result. Public Library of Science 2019-02-27 /pmc/articles/PMC6392470/ /pubmed/30811472 http://dx.doi.org/10.1371/journal.pone.0212802 Text en © 2019 Hong et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Hong, Wien Zhou, Xiaoyu Lou, Der-Chyuan A recoverable AMBTC authentication scheme using similarity embedding strategy |
title | A recoverable AMBTC authentication scheme using similarity embedding strategy |
title_full | A recoverable AMBTC authentication scheme using similarity embedding strategy |
title_fullStr | A recoverable AMBTC authentication scheme using similarity embedding strategy |
title_full_unstemmed | A recoverable AMBTC authentication scheme using similarity embedding strategy |
title_short | A recoverable AMBTC authentication scheme using similarity embedding strategy |
title_sort | recoverable ambtc authentication scheme using similarity embedding strategy |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6392470/ https://www.ncbi.nlm.nih.gov/pubmed/30811472 http://dx.doi.org/10.1371/journal.pone.0212802 |
work_keys_str_mv | AT hongwien arecoverableambtcauthenticationschemeusingsimilarityembeddingstrategy AT zhouxiaoyu arecoverableambtcauthenticationschemeusingsimilarityembeddingstrategy AT louderchyuan arecoverableambtcauthenticationschemeusingsimilarityembeddingstrategy AT hongwien recoverableambtcauthenticationschemeusingsimilarityembeddingstrategy AT zhouxiaoyu recoverableambtcauthenticationschemeusingsimilarityembeddingstrategy AT louderchyuan recoverableambtcauthenticationschemeusingsimilarityembeddingstrategy |