2021
DOI: 10.3390/math9202610
|View full text |Cite
|
Sign up to set email alerts
|

A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding

Abstract: In this paper, we propose a high-quality image authentication method based on absolute moment block truncation coding (AMBTC) compressed images. The existing AMBTC authentication methods may not be able to detect certain malicious tampering due to the way that the authentication codes are generated. In addition, these methods also suffer from their embedding technique, which limits the improvement of marked image quality. In our method, each block is classified as either a smooth block or a complex one based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…This is because the generation of authentication codes of [25][26][27] is The components for generating authentication codes, embedding techniques and detectability of methods [25][26][27] and the proposed method are summarized in Table 5. Furthermore, the performance in recovery domain for methods [20,21] are also compared. Comparisons are made between the various detection methods for "Detection of bananas", "Detection of orange" and "Detection of watermelon" with tampering collages of banana, orange and watermelon, respectively.…”
Section: π‘Ž 𝑏 𝐡mentioning
confidence: 99%
See 4 more Smart Citations
“…This is because the generation of authentication codes of [25][26][27] is The components for generating authentication codes, embedding techniques and detectability of methods [25][26][27] and the proposed method are summarized in Table 5. Furthermore, the performance in recovery domain for methods [20,21] are also compared. Comparisons are made between the various detection methods for "Detection of bananas", "Detection of orange" and "Detection of watermelon" with tampering collages of banana, orange and watermelon, respectively.…”
Section: π‘Ž 𝑏 𝐡mentioning
confidence: 99%
“…Comparisons are made between the various detection methods for "Detection of bananas", "Detection of orange" and "Detection of watermelon" with tampering collages of banana, orange and watermelon, respectively. The table shows that methods [20,[25][26][27] cannot detect all these types of tampering. The reason is that the components used for generating authentication codes are not included in all to-be-protected contents.…”
Section: π‘Ž 𝑏 𝐡mentioning
confidence: 99%
See 3 more Smart Citations