2018
DOI: 10.3390/sym10080318
|View full text |Cite
|
Sign up to set email alerts
|

Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images

Abstract: Since digital media is gaining popularity nowadays, people are more concerned about its integrity protection and authentication since tampered media may result in unexpected problems. Considering a better media protection technique, this paper proposes an efficient tamper detection scheme for absolute moment block truncation coding (AMBTC) compressed images. In AMBTC, each image block is represented by two quantization levels (QLs) and a bitmap. Requiring insignificant computation cost, it attracts not only a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
71
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(72 citation statements)
references
References 23 publications
1
71
0
Order By: Relevance
“…In Lin et al's scheme [29] and Hong et al's scheme [30], the stego-images' quality with the four-bit authentication code has average PSNRs of 33.07 and 32.33 dB, respectively. Also, we can observe that Hong et al's scheme [31] proposes two embedding strategies that can embed an eight-bit authentication code into each block, resulting in a TDR of 99.61% and average PSNRs of 28.92 and 29.84 dB. Meanwhile, with the same size of the authentication code, i.e., six bits, our proposed scheme and the Hong et al scheme [31] have the same effect with respect to the TDR.…”
Section: (D) Attack the Bitmap And Copy/paste A Flowermentioning
confidence: 73%
See 4 more Smart Citations
“…In Lin et al's scheme [29] and Hong et al's scheme [30], the stego-images' quality with the four-bit authentication code has average PSNRs of 33.07 and 32.33 dB, respectively. Also, we can observe that Hong et al's scheme [31] proposes two embedding strategies that can embed an eight-bit authentication code into each block, resulting in a TDR of 99.61% and average PSNRs of 28.92 and 29.84 dB. Meanwhile, with the same size of the authentication code, i.e., six bits, our proposed scheme and the Hong et al scheme [31] have the same effect with respect to the TDR.…”
Section: (D) Attack the Bitmap And Copy/paste A Flowermentioning
confidence: 73%
“…Also, we can observe that Hong et al's scheme [31] proposes two embedding strategies that can embed an eight-bit authentication code into each block, resulting in a TDR of 99.61% and average PSNRs of 28.92 and 29.84 dB. Meanwhile, with the same size of the authentication code, i.e., six bits, our proposed scheme and the Hong et al scheme [31] have the same effect with respect to the TDR. The average PSNR of our approach is 0.39 dB higher than that of the LSBP scheme and 0.05 dB lower than that of the MSBP scheme.…”
Section: (D) Attack the Bitmap And Copy/paste A Flowermentioning
confidence: 73%
See 3 more Smart Citations