A recoverable AMBTC authentication scheme using similarity embedding strategy

In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with the capability to recover tampered blocks. The existing methods may not be able to detect some types of intentional tampering. Meanwhile, the tampered blocks are only recovered by their means, causing an unpleasant mosaic-like appearance. The proposed method classifies image blocks into groups according to their similarities, and the group information is recorded for the recovery purpose. The multiple copies of the group information are scrambled and embedded into the bitmap of smooth blocks. The dominant portions of quantization levels are adjusted to generate a set of authentication code candidates. The codes with the minimal distortion are embedded into the least significant bits (LSBs) of the quantization levels. The tampered blocks can be recovered by averaging those untampered ones with the same index. The experimental results show that the proposed method not only achieves an excellent marked image quality and detectability, but also offers a satisfactory recovered result.

[1]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[2]  Xingming Sun,et al.  A novel image hashing scheme with perceptual robustness using block truncation coding , 2016, Inf. Sci..

[3]  Chia-Chen Lin,et al.  A novel hybrid image authentication scheme based on absolute moment block truncation coding , 2015, Multimedia Tools and Applications.

[4]  Tung-Shou Chen,et al.  Reversible data hiding using Delaunay triangulation and selective embedment , 2015, Inf. Sci..

[5]  Tzung-Her Chen,et al.  On the security of a BTC-based-compression image authentication scheme , 2017, Multimedia Tools and Applications.

[6]  Wen-Chuan Wu Quantization-based image authentication scheme using QR error correction , 2017, EURASIP J. Image Video Process..

[7]  Aamir Saeed Malik,et al.  Dual-purpose semi-fragile watermark: Authentication and recovery of digital images , 2013, Comput. Electr. Eng..

[8]  Pawel Korus,et al.  Towards Practical Self-Embedding for JPEG-Compressed Digital Images , 2015, IEEE Transactions on Multimedia.

[9]  Chin-Chen Chang,et al.  A Hierarchical Fragile Watermarking with VQ Index Recovery , 2011, J. Multim..

[10]  Kim-Kwang Raymond Choo,et al.  Tamper detection and image recovery for BTC-compressed images , 2016, Multimedia Tools and Applications.

[11]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[12]  Doaa Mohammed Image Compression Using Block Truncation Coding , 2011 .

[13]  Chin-Chen Chang,et al.  A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images , 2016, J. Inf. Hiding Multim. Signal Process..

[14]  Tung-Shou Chen,et al.  High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction , 2017, IEEE Signal Processing Letters.

[15]  L. Rabiner,et al.  The acoustics, speech, and signal processing society - A historical perspective , 1984, IEEE ASSP Magazine.

[16]  Shu-Fen Tu,et al.  Image tamper detection and recovery using adaptive embedding rules , 2016 .

[17]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[18]  Chia-Chen Lin,et al.  A High-Quality Image Authentication Scheme for AMBTC-compressed Images , 2014, KSII Trans. Internet Inf. Syst..

[19]  Chin-Chen Chang,et al.  A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..

[20]  Dan Hu,et al.  A novel search method based on artificial bee colony algorithm for block motion estimation , 2017, EURASIP Journal on Image and Video Processing.

[21]  Tung-Shou Chen,et al.  Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering , 2016, Signal Process. Image Commun..

[22]  Wei Li,et al.  Novel image authentication scheme with fine image quality for BTC-based compressed images , 2015, Multimedia Tools and Applications.

[23]  Shu-Fen Tu,et al.  Probability-based tampering detection scheme for digital images , 2010 .

[24]  R. Gray,et al.  Vector quantization , 1984, IEEE ASSP Magazine.

[25]  Der-Chyuan Lou,et al.  Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images , 2018, Symmetry.

[26]  K.-C. Liu Colour image watermarking for tamper proofing and pattern-based recovery , 2012 .

[27]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[28]  Tung-Shou Chen,et al.  An efficient reversible image authentication method using improved PVO and LSB substitution techniques , 2017, Signal Process. Image Commun..

[29]  Shaowei Weng,et al.  Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding , 2016, Inf. Sci..