“…are (20,64), (21,64), (22,64), (20,65), (21,65), (22,65), (20,66), (21,66), and (22,66 18) are the solutions to this problem, and thus we have the marked trio {â i ,b i ,B i } = {85, 132, [0111; 0111; 0001; 0000]}.…”
Section: The Msbs Perturbation Techniquementioning
confidence: 99%
“…Therefore, like the authentication methods for VQ and JPEG compressed images [3][4][5][6], the investigation of authentication for AMBTC compressed codes has received much attention, and subsequently, a number of authentication methods [7][8][9][10][11][12][13] in this field have been proposed in the past few years. These methods adopt spatial-domain data embedding techniques [14][15][16][17][18][19] or AMBTC-based compressed domain data hiding methods [20][21][22][23] to embed authentication codes (ACs) for the purpose of authentication.…”
Since digital media is gaining popularity nowadays, people are more concerned about its integrity protection and authentication since tampered media may result in unexpected problems. Considering a better media protection technique, this paper proposes an efficient tamper detection scheme for absolute moment block truncation coding (AMBTC) compressed images. In AMBTC, each image block is represented by two quantization levels (QLs) and a bitmap. Requiring insignificant computation cost, it attracts not only a wide range of application developers, but also a variety of studies to investigate the authentication of its codes. While the existing methods protect the AMBTC codes to a large extent, the leakage of some unprotected codes may be insensitive to intentional tampering. The proposed method fully protects the AMBTC codes by embedding authentication codes (ACs) into QLs. Meanwhile, the most significant bits of QLs are symmetrically perturbed to generate the candidates of ACs. The ACs that cause the minimum distortion are embedded into the least significant bits of QLs to minimize the distortion. When compared with prior works, the experimental results reveal that the proposed method offers a significant sensitivity-of-tamper property while providing a comparable image quality.
“…are (20,64), (21,64), (22,64), (20,65), (21,65), (22,65), (20,66), (21,66), and (22,66 18) are the solutions to this problem, and thus we have the marked trio {â i ,b i ,B i } = {85, 132, [0111; 0111; 0001; 0000]}.…”
Section: The Msbs Perturbation Techniquementioning
confidence: 99%
“…Therefore, like the authentication methods for VQ and JPEG compressed images [3][4][5][6], the investigation of authentication for AMBTC compressed codes has received much attention, and subsequently, a number of authentication methods [7][8][9][10][11][12][13] in this field have been proposed in the past few years. These methods adopt spatial-domain data embedding techniques [14][15][16][17][18][19] or AMBTC-based compressed domain data hiding methods [20][21][22][23] to embed authentication codes (ACs) for the purpose of authentication.…”
Since digital media is gaining popularity nowadays, people are more concerned about its integrity protection and authentication since tampered media may result in unexpected problems. Considering a better media protection technique, this paper proposes an efficient tamper detection scheme for absolute moment block truncation coding (AMBTC) compressed images. In AMBTC, each image block is represented by two quantization levels (QLs) and a bitmap. Requiring insignificant computation cost, it attracts not only a wide range of application developers, but also a variety of studies to investigate the authentication of its codes. While the existing methods protect the AMBTC codes to a large extent, the leakage of some unprotected codes may be insensitive to intentional tampering. The proposed method fully protects the AMBTC codes by embedding authentication codes (ACs) into QLs. Meanwhile, the most significant bits of QLs are symmetrically perturbed to generate the candidates of ACs. The ACs that cause the minimum distortion are embedded into the least significant bits of QLs to minimize the distortion. When compared with prior works, the experimental results reveal that the proposed method offers a significant sensitivity-of-tamper property while providing a comparable image quality.
“…Although the above proposed scheme obtains a considerable embedding capacity, there is room for improvement in increasing the capacity. At the same time, inspired by schemes [43], [44], another modified AMBTC compression codes based RDHECI scheme, M-AMBTC, is designed to work by adjusting the parity of the quantization levels. The modified AMBTC compression codes based scheme makes the peaks of the distribution of difference error values significantly high.…”
Section: Modified Ambtc Compression Codes Based Schemementioning
Recently, reversible data hiding in encrypted compressed images (RDHECI) has attracted more attention due to privacy information protection concerns. Meanwhile, AMBTC as one technique of lossy image compression that has lower storage costs and the simplicity in computation and is extensively used in many applications. Hence, this paper proposes an RDHECI scheme based on AMBTC, named O-AMBTC, to address privacy concerns. First, the original image is scrambled in a block-wise manner to generate the scrambled image which then is compressed by an AMBTC compression technique. Subsequently, the derived AMBTC compression codes are encrypted by using the methods of value modulation and stream cipher while the correlations between two quantization levels of AMBTC compression codes are retained and exploited to vacate redundant room to embed secret messages. Data hiding is then performed with the use of PBTL labeling strategy. In addition, another modified AMBTC compression code based RDHECI scheme, called M-AMBTC, is suggested to increase the ability to carry secret messages. In our dual approach, both the AMBTC-compressed image and the secret messages can be correctly recovered. Experimental results show that two proposed schemes are able to achieve average embedding rates as large as 0.6 bpp and 0.8 bpp when the block size is set to 2 × 2, respectively.
“…Malik et al [ 18 ] modified the AMBTC compression technique for embedding secret data. In their method, one-bit plane is converted to two-bit planes that can attain better image quality and high capacity.…”
Data hiding is the art of embedding data into a cover image without any perceptual distortion of the cover image. Moreover, data hiding is a very crucial research topic in information security because it can be used for various applications. In this study, we proposed a high-capacity data-hiding scheme for absolute moment block truncation coding (AMBTC) decompressed images. We statistically analyzed the composition of the secret data string and developed a unique encoding and decoding dictionary search for adjusting pixel values. The dictionary was used in the embedding and extraction stages. The dictionary provides high data-hiding capacity because the secret data was compressed using dictionary-based coding. The experimental results of this study reveal that the proposed scheme is better than the existing schemes, with respect to the data-hiding capacity and visual quality.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.