2020
DOI: 10.1371/journal.pone.0230997
|View full text |Cite
|
Sign up to set email alerts
|

A bit toggling approach for AMBTC tamper detection scheme with high image fidelity

Abstract: The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. However, the marked image qualities of these schemes can be enhanced, and their authentication methods may fail to detect some special tampering. We propose a secure AMBTC tamper detection scheme that preserves high image fidelity with excellent detectability. In the proposed approach, a bit in bitmaps of AMBTC codes is sequentially toggled to generate a set of authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…The other problem of this method is that they used the trace of singular values, which is not enough for authentication and causes a big False Positive Rate (FPR) in detection. An AMBTC authentication method with efficient detection ability was proposed by Hong et al in 2020 but this is not capable of recovering the original images [35].…”
Section: Background Reviewmentioning
confidence: 99%
“…The other problem of this method is that they used the trace of singular values, which is not enough for authentication and causes a big False Positive Rate (FPR) in detection. An AMBTC authentication method with efficient detection ability was proposed by Hong et al in 2020 but this is not capable of recovering the original images [35].…”
Section: Background Reviewmentioning
confidence: 99%
“…The methods of spatial domain [5][6][7][8] embed the authentication code directly into pixels of the image, this type of technique allows to obtain a high image quality and a large space for carrying information. The image authentication methods of the compressed domain [9][10][11][12][13][14][15][16][17][18][19][20][21][22], on the other hand, embed the authentication code into the compressed code. Compressed images are preferred for transmission over the network because smaller files facilitate network transmission.…”
Section: Introductionmentioning
confidence: 99%
“…Compressed images are preferred for transmission over the network because smaller files facilitate network transmission. Currently, the joint photographic experts group (JPEG) [9,10], vector quantization (VQ) [11,12], absolute moment block truncation coding (AMBTC) [13][14][15][16][17][18][19][20][21][22] and so on are commonly used compression techniques. Among these techniques, AMBTC requires less computation and has a satisfactory compression rate, which has attracted some research in this area in recent years [13][14][15][16][17][18][19][20][21][22].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations