2019
DOI: 10.1109/access.2019.2944833
|View full text |Cite
|
Sign up to set email alerts
|

TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix

Abstract: This paper proposes a novel authentication scheme for absolute moment block truncation coding (AMBTC) of a compressed image using turtle shell based data hiding. For simplicity, we call it turtle shell based image authentication method (TSIA in short). For each block, a 3-bit authentication code (AC) is generated by combining the bitmap with a pseudo-random sequence and is concealed into the corresponding quantization levels with the use of a reference matrix. In order to solve the problem of having a high qua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(38 citation statements)
references
References 23 publications
1
37
0
Order By: Relevance
“…The experimental results and analysis imply that our approach outperforms other existing related methods in terms of embedding capacity and visual quality. In the future, a more efficient and lossless hiding method coworking with different kinds of matrix coding or turtle shelling matrix [41], [42] could be further explored.…”
Section: Discussionmentioning
confidence: 99%
“…The experimental results and analysis imply that our approach outperforms other existing related methods in terms of embedding capacity and visual quality. In the future, a more efficient and lossless hiding method coworking with different kinds of matrix coding or turtle shelling matrix [41], [42] could be further explored.…”
Section: Discussionmentioning
confidence: 99%
“…These four generated codes are to be embeded into quantization values using APPM, and the one that causes the least distortion will be selected as the final authentication code. To embed (21,27) has the shortest distance to (22,28) , and…”
Section: B Embedment Of Authentication and Recovery Codesmentioning
confidence: 99%
“…Semi-fragile watermarking is not sensitive to minor image modifications (e.g., JPEG compression), but is sensitive to malicious tampering [6]. In contrast, fragile watermarking is sensitive to any tampering [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25], which protects the image to the largest extent. For the fragile watermarking method, since the embedded authentication code is fragile, tampering with the image will also destroy the authentication code.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, AMBTC compression is suitable to the images with two sets of pixel characteristics, e.g., the images in which the edge or the contour is prominent. Many data hiding methods involving AMBTC compression have been recently proposed [19][20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%