Next Article in Journal
A Binary Machine Learning Cuckoo Search Algorithm Improved by a Local Search Operator for the Set-Union Knapsack Problem
Next Article in Special Issue
Automatic Image Characterization of Psoriasis Lesions
Previous Article in Journal
Mixed Mesh Finite Volume Method for 1D Hyperbolic Systems with Application to Plug-Flow Heat Exchangers
Previous Article in Special Issue
A Method of Image Quality Assessment for Text Recognition on Camera-Captured and Projectively Distorted Documents
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding

1
Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung City 404, Taiwan
2
School of Information Engineering, Jimei University, Xiamen 361021, China
3
Department of Distribution Management, National Taichung University of Science and Technology, Taichung City 404, Taiwan
4
School of Electrical and Computer Engineering, Nanfang College of Guangzhou, Guangzhou 510970, China
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(20), 2610; https://doi.org/10.3390/math9202610
Submission received: 4 September 2021 / Revised: 7 October 2021 / Accepted: 11 October 2021 / Published: 16 October 2021
(This article belongs to the Special Issue Mathematical Approaches to Image Processing with Applications)

Abstract

:
In this paper, we propose a high-quality image authentication method based on absolute moment block truncation coding (AMBTC) compressed images. The existing AMBTC authentication methods may not be able to detect certain malicious tampering due to the way that the authentication codes are generated. In addition, these methods also suffer from their embedding technique, which limits the improvement of marked image quality. In our method, each block is classified as either a smooth block or a complex one based on its smoothness. To enhance the image quality, we toggle bits in bitmap of smooth block to generate a set of authentication codes. The pixel pair matching (PPM) technique is used to embed the code that causes the least error into the quantization values. To reduce the computation cost, we only use the original and flipped bitmaps to generate authentication codes for complex blocks, and select the one that causes the least error for embedment. The experimental results show that the proposed method not only obtains higher marked image quality but also achieves better detection performance compared with prior works.

1. Introduction

With the rapid development of the Internet, image editing softwares, such as Photoshop, Snapseed and Mix, have been rapidly developed. These software programs allow people to edit images easily, which means that digital images are vulnerable to be tampered during transmission. Under this trend of Internet development, authenticating the integrity of digital images is gradually becoming an important issue. Fragile watermarking method is a commonly used authentication technique by embedding the authentication code into the image in order to provide protection [1,2,3,4]. If the image is tampered during transmission, then the authentication code embedded in the image will also be changed. Therefore, it is possible to know whether an image has been tampered with by determining whether the embedded authentication code has been changed.
Depending on the domain in which the authentication code is embedded, fragile watermarking can be divided into two types, spatial domain and compressed domain. The methods of spatial domain [5,6,7,8] embed the authentication code directly into pixels of the image, this type of technique allows to obtain a high image quality and a large space for carrying information. The image authentication methods of the compressed domain [9,10,11,12,13,14,15,16,17,18,19,20,21,22], on the other hand, embed the authentication code into the compressed code. Compressed images are preferred for transmission over the network because smaller files facilitate network transmission. Currently, the joint photographic experts group (JPEG) [9,10], vector quantization (VQ) [11,12], absolute moment block truncation coding (AMBTC) [13,14,15,16,17,18,19,20,21,22] and so on are commonly used compression techniques. Among these techniques, AMBTC requires less computation and has a satisfactory compression rate, which has attracted some research in this area in recent years [13,14,15,16,17,18,19,20,21,22].
AMBTC [23], proposed by Lema and Mitchell in 1984, is an improved version of block truncation coding (BTC) [24]. It compresses the image blocks into trios, each trio consisting of two quantization values and a bitmap. The existing AMBTC authentication methods typically embed the authentication codes into the quantized values or bitmaps. Based on the AMBTC compression method, [15] uses a pseudo random number generator (PRNG) to generate the authentication codes and embeds them into the quantized values. Their method is effective in protecting the image to some extent, but the authentication codes can only in base 7. Ref. [16] also proposes a method for AMBTC image authentication based on a special designed reference table, and this method outperforms previous works in terms of marked image quality. However, their approach does not utilize bitmaps to generate authentication codes, resulting in the inability to detect bitmap tampering. Ref. [17] proposes an authentication method with higher security based on the weaknesses of [16]. Ref. [17] generates the authentication code by performing exclusive-or operation of the bitmap with random numbers, which not only maintains the same image quality as in [16], but also detects tampering of the bitmap. To obtain a better authentication effect and marked image quality, [18] uses quantized values of most significant bites (MSB) and bitmaps to generate authentication codes and embeds them into quantized values of least significant bits (LSB). Their method also perturbs the MSB of the quantized values to reduce the error of embedding. Thus, [18] not only preserves the image effectively, but the image quality is also comparable to the method of [17]. To detect the splice tampering, [20] utilizes the block location information in addition to the bitmap to generate the authentication code. They generate different authentication codes by toggling the bitmap and select the authentication code that causes the least error to embed into the quantized values. However, their method does not considered the flipped bitmap may result in a better embedding performance, thus limiting the image quality improvement.
Ref. [19] combines the bitmap with a pseudo-random sequence to generate a 3-bit authentication code, which is embedded into the quantized values by surveying the reference table. Also, this method uses an iterative embedding mechanism to solve the problem that the high quantized values might be smaller than the low ones after embedding. Due to the relatively compact arrangement of the numbers inside reference table, their method achieves a better marked image quality. However, based on the limitations of the searching method, this method can only embed an octal (3 bits) authentication code for each pixel pair. In addition, their searching approach may not find the best marked quantized values to reduce the embedding error. Finally, the authentication code of this method is generated independently of the location information, which makes the swapping of image blocks undetectable.
The existing methods [15,16,17,18,19,20] can achieve most of the tampering detection and a good image quality. However, due to the design of the embedding technique, the authentication code in [15] can only be digits of base 7, [16,17] can only be digits of bases 2, 4, 8 and 16, while [19] can only be digit of base 8. Furthermore, the authentication code generation of [15,16], [18,19] is independent of the bitmaps or block location information, causing these methods unable to detect some specific malicious tampering. Compared to [15,16,17,18], the image quality obtained by [19] is the highest, but the searching approach of this method limits the enhancement of image quality. In contrast to [19], the method of [20] uses a filtering mechanism to reduce the error and obtains a better marked image quality. Nevertheless, the filtering mechanism in [20] does not take into account some characteristics of AMBTC codes, which means that the image quality can be further improved.
For an AMBTC code, if the quantized values are swapped and the bitmap is flipped, the decompressed block will be exactly the same as the one decompressed from the original code [25]. Based on this attractive property, the proposed method toggles one bit of the original and flipped bitmaps in sequence to generate a set of authentication codes. By surveying the reference table, the authentication code that causes the least error is embedded in quantized values using the PPM technique. Experimental results show that our method not only embeds authentication codes of arbitrary length and obtains the highest image quality, but also achieves a satisfactory detection results compared with the aforementioned methods.
The rest of the paper is structured as follows. Section 2 will introduce the AMBTC compression and the reference table based (RT-based) technique. Section 3 will introduce the proposed method, and experimental results and conclusions will be given in Section 4 and Section 5, respectively.

2. Related Works

This section will briefly introduce the basic concepts of AMBTC and the RT-based embedding techniques required by [19] and the proposed method. The details will be presented in the following two subsections.

2.1. AMBTC Compression Method

To encode the image I using the AMBTC compression method, firstly we divide I into N non-overlapping blocks { I i } i = 0 N 1 of size n × n , and calculate the average value m i of block I i :
m i = 1 n × n j = 0 n × n 1 I i , j ,
where I i , j represents the j-th pixel of i-th block. Next, the value of the j-th bit B i , j in the bitmap B i is obtained by comparing all the pixels of I i with m i :
B i , j = { 0 if I i , j m i , 1 otherwise .
Based on B i , the low quantized value a i and the high quantized value b i can be calculated by:
a i = 1 p B i , j = 0 I i , j ,
b i = 1 q B i , j = 1 I i , j ,
where p and q are the number of ‘0’ and ‘1’ in B i , respectively. All blocks are processed in the same procedures, and the compression codes { a i , b i , B i } i = 0 N 1 of the image I is obtained. The decompressed block D i can be obtained by decoding { a i , b i , B i } using the equation
D i , j = { a i if B i , j = 0 , b i otherwise ,
where D i , j is the j-th pixel of D i . All codes { a i , b i , B i } i = 0 N 1 are decompressed in the same manner, and we eventually obtain the decompressed image D = { D i } i = 0 N 1 .
Here we briefly introduce the encoding and decoding procedures of AMBTC using a block. Assume a block of size 4 × 4 is I i = [66, 85, 87, 62; 91, 79, 86, 97; 85, 57, 56, 69; 52, 72, 97, 43]. The mean m i = 74 of I i is calculated firstly. Next, According to Equations (2)–(4), we obtain B i = [0, 1, 1, 0; 1, 1, 1, 1; 1, 0, 0, 0; 0, 0, 1, 0], a i = 60 , and b i = 88 . We can use Equation (5) to decode { a i , b i , B i } , and the decompressed block D i = [60, 88, 88, 60; 88, 88, 88, 88; 88, 60, 60, 60; 60, 60, 88, 60] can be calculated.

2.2. The Embedding Techniques Based on Reference Table

The RT-based embedding techniques embed a digit of base 2 α into each pixel pair by surveying a reference table. The reference table is a matrix of size 256 × 256 with numbers in the range from 0 to 2 α 1 . The RT-based techniques to be introduced in this section are the turtle shell embedding (TSE) [26] and the pixel pair matching (PPM) techniques [27]. Figure 1a,b show partial reference tables for TSE and PPM, both of which can be used to embed digits of base 2 3 = 8 .
The TSE embedding method embeds a digit ranging from 0 to 2 3 1 = 7 into a pixel pair ( a i , b i ) by surveying a 3-bit reference table R 3 TSE . The value located in ( a i , b i ) in the R 3 TSE can be generated by the following equation [28].
R 3 TSE ( a i , b i ) = [ a i + 1 2 × b i × 2 + 1 2 × b i × 3 ] mod 8 ,
where a i and b i are ranging from 0 to 255. After the reference table R 3 TSE is generated, the digits in R 3 TSE can be grouped into three categories according to their positions. Different categories use different search methods to embed the authentication codes. In the first case, if ( a i , b i ) is not in the bounds of a complete hexagon (e.g., ( a i , b i ) = ( 3 , 0 ) in Figure 1a), then we find a location ( a ^ i , b ^ i ) that is the closest to ( a i , b i ) while satisfying R 3 TSE ( a ^ i , b ^ i ) = a c i . In the second case, ( a i , b i ) is located in the edge of at least one hexagon, (e.g., ( 1 , 4 ) or ( 2 , 2 ) in Figure 1a), then we find a location ( a ^ i , b ^ i ) from all touched hexagons that is the closest to ( a i , b i ) while satisfying R 3 TSE ( a ^ i , b ^ i ) = a c i . In the third case, if ( a i , b i ) is within a hexagon (e.g., ( 4 , 6 ) in Figure 1a), then we find a location ( a ^ i , b ^ i ) from the hexagon that satisfies R 3 TSE ( a ^ i , b ^ i ) = a c i . Once the location ( a ^ i , b ^ i ) is found, a c i can be embedded by replacing pixel pair ( a i , b i ) with ( a ^ i , b ^ i ) .
However, the searching method provided by the TSE might not always gives the best solution. For example, suppose a c i = 4 is to be embedded into ( a i , b i ) = ( 1 , 4 ) , which is fitted in the second case. Since R 3 TSE ( 1 , 2 ) = R 3 TSE ( 3 , 5 ) = 4 , and ( 1 , 2 ) is closer to ( 1 , 4 ) , we obtain the embedded pixel pair ( a ^ i , b ^ i ) = ( 1 , 2 ) . Obviously, ( 0 , 4 ) is a better solution for this problem because it is closer to ( 1 , 4 ) than ( a ^ i , b ^ i ) = ( 1 , 2 ) and also satisfies R 3 TSE ( 0 , 4 ) = 4 . A similar problem also might happen in the third case.
In contrast to the TSE technique, the PPM embedding method also adopts a reference table R α PPM to embed a digit of base 2 α into each pixel pair, and the base of digit is not limited to 8. The reference table R α PPM can be generated by using the formula
R α PPM ( a i , b i ) = ( a i × c α + b i ) mod 2 α ,
where c α is a constant. Some commonly used constants are c 2 = 2 , c 3 = 3 , c 4 = 6 and c 6 = 14 . See [27] for a complete list of c α . To embed a c i into a pixel pair ( a i , b i ) , the PPM method searches in the vicinity of ( a i , b i ) and finds a location ( a ^ i , b ^ i ) that is closest to ( a i , b i ) while satisfying R α PPM ( a ^ i , b ^ i ) = a c i . During the extraction, reference table R α PPM and ( a ^ i , b ^ i ) are known, and the embedded authentication code can be extracted by a c i = R α PPM ( a ^ i , b ^ i ) . Since the PPM method is more flexible and provides a satisfactory embedding performance, the PPM will be used as the embedding technique in our method.
Here is a simple example to illustrate the PPM. Let R 3 PPM be a reference table for embedding digits of base 2 3 = 8 . Suppose a c i = 1 and ( a i , b i ) = ( 4 , 2 ) . Since R 3 PPM ( 5 , 2 ) = 1 and ( 5 , 2 ) is the closest to ( 4 , 2 ) (see Figure 1b), the marked pixel pair ( a ^ i , b ^ i ) = ( 5 , 2 ) is obtained. The embedded authentication code a c i can be extracted by R 3 PPM ( 5 , 2 ) = 1 .

3. The Proposed Method

The authentication codes generated by [15,16,18] are independent of bitmaps or location information; therefore, these methods cannot detect tampering of bitmaps or swapping of image blocks. Ref. [17] can detect some tampering missed by the above methods, but based on the design of the embedding method, the length of the authentication code and the quality of the marked image are limited. Among these methods, only [18] can embed authentication code of arbitrary length. Moreover, the methods of [15,16,17] are not designed with a selection mechanism to reduce the embedding error. In [18], although the embedding error is reduced by perturbing the MSB of the quantized values, this method uses the LSB replacement which creates a large error, and therefore also limits the quality improvement. To enhance the image quality, [19] employs the TSE to embed the authentication codes. The quality of marked images obtained by [19] is higher than that of [15,16,17,18], due to the compact arrangement of digits in the reference table used by TSE. However, according to the analysis in Section 2.2, it can be known that the best marked quantized values may not be found by using the search method of TSE. Moreover, due to the search method, TSE can only work with a 3-bit reference table to embed an authentication code of base 8. As in [18], the generation of authentication codes in [19] is independent of the location information, so the swapping of blocks cannot be detected.
In this paper, we use different approaches to embed authentication codes into smooth and complex blocks. Given a trio { a i , b i , B i } of a block D i , the smoothness of D i is determined by | a i b i | . If | a i b i | T , where T is a pre-defined threshold, the block is classified as a smooth one; otherwise, it is a complex one. It is known that if the quantized values are swapped and the bitmap is flipped, the decompressed block will be exactly the same as the one decompressed from the original trio [25]. Based on this property, the proposed method toggles a bit in the original and flipped bitmaps of a smooth block to generate a set of authentication codes. These codes are embedded into the quantized values using the PPM, and the trio of the least distorted block after embedding the authentication code is selected as the marked trio. For a complex block, instead of using the toggling technique, only the original and flipped bitmaps are used to generate two authentication codes to reduce the computation cost.

3.1. Embedment of Smooth Blocks

Let { a i , b i , B i } be the trio of a smooth block to be embedded with authentication codes, and D i be the image block decoded from { a i , b i , B i } . According to the precious property of the AMBTC method, D i can also be obtained by decoding { b i , a i , B ¯ i } , where B ¯ i is B i with all bits flipped. Let a i 0 = a i , b i 0 = b i , B i 0 = B i , a i 1 = b i , b i 1 = a i , and B i 1 = B ¯ i , then { a i 0 , b i 0 , B i 0 } and { a i 1 , b i 1 , B i 1 } can be expressed as { a i f , b i f , B i f } , where 0 f 1 . Let B i f , k be the bitmap of B i f with k - th bit toggled. Using MD5 [29] to hash { { B i f , k } f = 0 1 } k = 0 n × n and position information i , and folding each result into α bits, we obtain 2 ( n × n + 1 ) candidates of authentication codes { { a c i f , k } f = 0 1 } k = 0 n × n . The PPM method described in Section 2.2 is then applied to embed these authentication codes into pixel pairs { a i f , b i f } f = 0 1 and we obtain { { a ^ i f , k , b ^ i f , k } f = 0 1 } k = 0 n × n . { { a ^ i f , k , b ^ i f , k } f = 0 1 } k = 0 n × n together with { { B i f , k } f = 0 1 } k = 0 n × n can be decoded to obtain image blocks { { D ^ i f , k } f = 0 1 } k = 0 n × n . The Euclidian distances between { { D ^ i f , k } f = 0 1 } k = 0 n × n and D i are calculated, and the one that has the shortest distance is found and is denoted by D ^ i f , k . The trio of D ^ i f , k , denoted by { a ^ i f , k , b ^ i f , k , B i f , k } , is the marked trio of our method. The procedures of finding the marked trio can be formulated as an optimization problem described below:
Minimize :   j = 0 n × n 1 ( D ^ i , j f , k D i , j ) 2 ,
Subject   to :   a c i f , k = hash α ( B i f , k , i ) ,
R α PPM ( a ^ i f , k , b ^ i f , k ) = a c i f , k ,
D ^ i f , k = de ( a ^ i f , k , b ^ i f , k , B i f , k ) ,
0 f 1 ,   0 k n × n ,   k , f Integer ,
where de() is the decode function of AMBTC, and hash α ( x ) is the function to acquire α - bit authentication code.
Here is an example to illustrate the process of generating authentication codes using MD5. Let α = 4 , n = 2 , and the bitmap of the eighth block is B 8 = [1, 1, 0, 0]. We use the position i = 8 of the image block and the bitmap B 8 to perform the MD5 operation and obtain 128 bits hash code. Suppose the hex-decimal value of the 128 bits is ‘36b4c42c4c30d841672290f28e66186a’. Then, we fold the 128 bits in half. The first 64 bits are xor-ed with the remaining 64 bits, and we obtain the 64-bit xor-ed result (the hex-decimal value is ‘519654dec256c02b’). Repeat this procedure and finally we can obtain a 4-bit authentication code ‘0001’. In case it is not possible to obtain exactly 4 bits, the extra bits can be discarded. Note that the function hash α ( B i f , k , i ) used in this paper already contains the folding operation, which can output α -bit authentication code directly.
Next, we use an example to illustrate the embedding procedures of a smooth block D i . Assume n = 2 , T = 6 , α = 4 and { a i , b i , B i } = { 74 , 76 , 1001 } . Since | a i b i | = 2 < T , and we have ( a i 0 , b i 0 ) = ( 74 , 76 ) , { B i 0 , k } k = 0 4 = {0001, 1101, 1011, 1000, 1001}, ( a i 1 , b i 1 ) = ( 76 , 74 ) and { B i 1 , k } k = 0 4 = {1110, 0010, 0100, 0111, 0110}. Suppose the authentication codes generated from { B i 0 , k } k = 0 4 , and { B i 1 , k } k = 0 4 are { a c i 0 , k } k = 0 4 = {2, 1, 10, 14, 3} and { a c i 1 , k } k = 0 4 = {9, 10, 11, 8, 2}. The codes { a c i 0 , k } k = 0 4 and { a c i 1 , k } k = 0 4 are then embedded into (74, 76) and (76, 74) using the PPM. According to the reference table R 4 PPM shown in Figure 2, we obtain { a ^ i 0 , k , b ^ i 0 , k } k = 0 4 = {(73, 76), (73, 75), (74, 78), (75, 76), (73, 77)} and { a ^ i 1 , k , b ^ i 1 , k } k = 0 4 = {(77, 75), (77, 76), (75, 73), (77, 74), (76, 74)}. The trios { { a ^ i f , k , b ^ i f , k , B i f , k } f = 0 1 } k = 0 4 are then decoded and we obtain { { D ^ i f , k } f = 0 1 } k = 0 4 . The squared distance between { { D ^ i f , k } f = 0 1 } k = 0 4 and D i is 11, 4, 24, 3, 4, 4, 15, 4, 5 and 0. Since D ^ i f , k = D i 1 , 4 has the shortest distance to D i (distance is 0), and the final marked trio { a ^ i f , k , b ^ i f , k , B i f , k } = { 76 , 74 , 0110 } can be obtained.

3.2. Embedment of Complex Blocks

It is noted that toggling bits in the bitmaps often causes large errors when the difference between high and low quantized values is large. Thus, for complex blocks, most of the bitmaps of the solutions to Equations (8)–(12) are B i 0 , n × n and B i 1 , n × n , i.e., either original bitmap B i 0 or the flipped bitmap B i 1 is found in the marked trio. Based on the consideration of computational cost, the toggling technique will not be used in generating authentication codes for complex blocks. Given a trio { a i , b i , B i } of a complex block, the location information i and bitmaps { B i f } f = 0 1 are used to generate two authentication codes { a c i f } f = 0 1 with α bits using Equation (9). Next, the codes { a c i f } f = 0 1 are embedded into ( a i f , b i f ) using the PPM and we obtain the marked trios { a ^ i f , b ^ i f , B i f } f = 0 1 . Then, decompress { a ^ i f , b ^ i f , B i f } f = 0 1 to obtain blocks { D ^ i f } f = 0 1 and find the block D ^ i f that has the shorter distance with D i . The trio of D ^ i f , denoted by { a ^ i f , b ^ i f , B i f } , is selected as the final marked trio. The embedding procedures of the proposed method can be seen in Figure 3.
A simple example is presented to show the embedding procedures of a complex block D i . Let n = 2 , T = 6 , α = 4 and { a i , b i , B i } = { 71 , 79 , 1100 } . Since | a i b i | = 8 > T , we have { a i 0 , b i 0 , B i 0 } = { 71 , 79 , 1100 } and { a i 1 , b i 1 , B i 1 } = { 79 , 71 , 0011 } . Suppose the authentication codes generated from B i 0 and B i 1 are 8 and 12, and embed them into (71, 79) and (79, 71), respectively, using the PPM. According to the reference table R 4 PPM shown in Figure 2, we know R 4 PPM ( 71 , 78 ) = 8 and R 4 PPM ( 78 , 72 ) = 12 . Therefore, ( a ^ i 0 , b ^ i 0 ) = ( 71 , 78 ) and ( a ^ i 1 , b ^ i 1 ) = ( 78 , 72 ) can be obtained. The trios { 71 , 78 , 1100 } and { 78 , 72 , 0011 } are decoded to obtain block D ^ i 0 and D ^ i 1 . Next, the squared distance between D ^ i 0 and D i is 2, while the squared distance between D ^ i 1 and D i is 4. Since D ^ i f = D ^ i 0 has the shorter distance to D i , and we obtain the final marked trio { a ^ i f , b ^ i f , B i f } = { 71 , 78 , 1100 } .

3.3. The Authentication Procedures

This sub-section describes the authentication procedures of the proposed method. Assume that the to-be-authenticated trios are { a i , b i , B i } i = 0 N 1 . For each trio { a i , b i , B i } , use the function hash α ( B i , i ) to generate an α - bit authentication code a c i . Then, by surveying the reference table R α PPM , the authentication code e a c i embedded in ( a i , b i ) is extracted, and determine whether a c i and e a c i are equal. If a c i = e a c i , then this block has not been tampered with; otherwise, it has been tampered with. The detailed procedures can be found in Figure 4.
The above authentication procedures are called the first stage authentication. To refine the detection result, the second stage authentication is adopted in the proposed method. Since collisions may occur during authentication, the smaller the length of the embedded authentication code, the higher the probability of collision. It means that more blocks are tampered with but not detected in the first stage authentication. We know that most of the tampering is clustered in a certain area. Thus, if an untampered block surrounded by blocks that have been tampered with, then the block may has been tampered with as well. Therefore, in the second stage authentication, if a block is detected as untampered in the first stage, but the blocks above and below or left and right of this block have been judged as tampered, the detection result of this block will be modified to be tampered. All blocks are processed using the procedures described above, and the final detection results are obtained.

4. Experimental Results

In order to evaluate the effectiveness of the proposed method, we perform different experiments on a set of grayscale images. Eight grayscale images of size 512 × 512 , including Lena, Tiffany, House, Jet, Peppers, Splash, Boat and Baboon, will be used as test images, as shown in Figure 5. These images can be obtained from the USC-SIPI image database [30]. We also compare the image quality as well as detection results of the proposed method with [17,18,19]. Image quality is measured using the peak signal-to-noise ratio (PSNR), which is defined as:
PSNR = 10 log 10 ( 255 2 × W × H i = 0 W × H 1 ( x i x i ) 2 ) ,
where W and H represent the width and height of a test image, and x i and x i represent the i - th pixel of the AMBTC compressed image and the marked image, respectively. Higher PSNR means better quality of the image. In the following experiments, the block size used is 4 × 4 .

4.1. Quality Evaluation of the Proposed Method

In the proposed method, the computation cost and the marked image quality increase with the increase of threshold T . However, when T exceeds the critical value T * , it only increases the computational effort and may not contribute to the image quality. Table 1 shows the relationship between threshold value and image quality for embedding authentication code of lengths 2, 4 and 6. It can be found from the table that regardless of α , the image quality is the highest when T = 255 . The reason is that when T = 255 , all blocks are treated as smooth ones. On the contrary, when T = 1 , all blocks are treated as complex ones, so the obtained quality is the lowest among all thresholds, but less computation is required. Interestingly, when α = 2 , the quality of the test image is the same at T = 3 and T = 255 , but T = 3 requires significantly less computation. Therefore, when α = 2 , T * = 3 gives the best image quality with affordable computation cost. Similarly, for α = 4 and α = 6 , we choose the thresholds T * = 6 and T * = 12 , respectively.
Table 2 lists the suggested threshold T * in our method with various α . From the table, we can find that as α increases, the threshold value also increases. This is because the more authentication codes a trio embeds, the more damage is done to the quantized values. In this case, a block is more likely needed to toggle a bit in the bitmap to reduce the embedding error. As a result, T * also becomes larger.

4.2. Detectability of the Proposed Method

This section shows the detectability of the proposed method for the tampered Lena images when α is 2, 4 and 6. First of all, the different lengths of authentication codes are embedded into trios of the Lena image codes to obtain marked images. Figure 2a shows the marked Lena image when α = 6 . Due to the small number of embedded bits, it is difficult for the human eye to distinguish the marked and original images (See Figure 1a). Next, the marked Lena image is tampered by adding a crown to the Lena’s hat, as shown in Figure 6b. There are 16,384 blocks in this image, and 2053 blocks are tampered, which gives a tampering rate of 12.53%.
Figure 7 shows the detection results of the proposed method when α = 2 , 4 and 6 , where Figure 7a–f are the detection results of the first stage and the second stage, respectively. From the first stage detection results, it is clear that the larger the α is, the better the first stage detection will be. This is because the collision probability 1 / 2 α when α = 2 , 4 and 6 is 0.25, 0.0625 and 0.0156, respectively. By comparing Figure 7a–c and Figure 7d–f, it can be found that the second stage detection effectively improves the detection results, especially when α  is small.
To further evaluate the detection performance of the proposed method, different measures will be used to show the detection effectiveness of our method, as shown in Table 3. In the table, true positive rate (TPR) is the probability of a tampered trio also reported as a tampered one, and false negative rate (FNR) is the probability of a tampered trio but reported untampered. As can be seen from the table, the FNRs of the first stage are 25.28%, 5.45% and 1.32% when α = 2 , 4 and 6 , respectively, which are well consistent with the theoretical values of 25%, 6.25% and 1.56%. TPR = 100 %   FNR also agrees with the theoretical value. Interestingly, the second stage detection effectively increased the TPR while decreasing the FNR. For example, when α = 2 , the probability of TPR in the first stage is 74.72%, which rises to 95.62% in the second stage. Meanwhile, the probability of FNR dropped from 25.28% to 4.38%. Therefore, it is desirable to use the second stage of detection.

4.3. Quality Comparisons with Other Works

To show the superiority of our method, we compare the image quality of the proposed method with [17,18,19] for α = 2 , 3 , 4 , 6 , as shown in Table 4. In this table, ‘n/a’ indicates that the method is not applicable. From the table, we can observe that the method of [17] can embed authentication code of lengths 2, 3 and 4, whereas it cannot embed 6 bits. This is because their method can only embed up to 4 bits. By improving this shortcoming of [17], the method of [18] can embed authentication code of arbitrary length. The image quality obtained by [17] is the lowest among the compared methods when α = 2   and   3 . In contrast, the image quality of [18] is the lowest when α = 4 , which is due to the design of their embedding method.
As for [19], their method can only embed a 3-bit authentication code into each trio based on a reference table R 3 TSE . Nevertheless, due to the compact arrangement of digits in R 3 TSE , the image quality obtained by [19] is better than that of [17,18]. For example, when α = 3 , the Lena image quality of [19] is 49.79 dB, while the quality of [17,18] are 46.40 and 48.56 dB, respectively. However, the Lena image quality of the proposed method is 51.68 at α = 3 , which is higher than that of [19]. In addition, the proposed method can achieve the best image quality regardless of α . For example, when α = 2 , the Lena image quality of our method is 54.07 dB, which is 54.07 49.90 = 4.17 dB higher than [17] and 54.07 51.75 = 2.32 dB higher than [18]. From the above analysis, it is clear that our method can not only embed arbitrary length of authentication code, but also obtain the best image quality.
In addition to comparing the PSNR of images, we also compared the structural similarity (SSIM) [31] for different methods using α = 3 . The results are shown in Table 5. SSIM is a metric for measuring the similarity of images. A larger SSIM means that the two images are more similar. The maximum value of SSIM is 1. As can be seen from the table, the SSIMs of different methods are all greater than 0.980, meaning that a satisfactory visual effect can be obtained by these methods. However, among the compared methods, the proposed method obtains the highest SSIM. Taking the test image Lena as an example, the SSIMs obtained in [17,18,19] are 0.990, 0.994 and 0.995, respectively, while the SSIM obtained by our method is 0.997. Note that thought the experiments are conducted using α = 3 , other α also reveals similar results. Therefore, compared with other methods, our method can obtain better visual effects.
It is worth noting that the proposed method uses MD5 to generate the authentication codes, which will take longer time for code generation compared to the approach used in [17]. However, the MD5 (and other hash function) is sensitive to the input. That is, small alterations in pixel values will generate different codes. The proposed method subtly takes advantage of this feature to generate a set of codes, and the one that causes the least distortion is selected as the final authentication code. Therefore, the image quality of the proposed method outperforms other works.

4.4. Detectability Comparisons with Other Works

This section shows the detectability of [17,18,19] and the proposed method for various tamperings. Figure 8 shows the tampering of the marked Jet image with three lifting bodies clipped from another image. The marked and tampered images are shown in Figure 8a,b, whereas the corresponding tampered regions are given in Figure 8c. Since the method of [19] can only embed authentication code of length 3, we set α = 3 in the experiments of this section for a fair comparison.
Figure 9 shows the first and second stage detection results of [17,18,19] and the proposed method. In these figures, the white dots in the tampered regions represent undetected tampered blocks. Since α = 3 , the probability of collision rate is approximately 1 / 2 3 = 0.125 , meaning that around 12.50% tampered blocks are undetected, as shown in Figure 9a–d. However, the white dots are significantly reduced (see Figure 9e–h) if the second stage detection is applied, indicating the effectiveness of using this stage.
To further evaluate the detection performance of various methods, we use different metrics to measure their effectiveness, as shown in Table 6. In this table, TPR = TP/(TP+FN), FNR = FN/(TP+FN) and PR = TP/(TP+FP). TP indicates the number of blocks that are tampered with and detected as tampered. FN is the number of blocks that are tampered but detected as not tampered, whereas FP represents the number of blocks that are not tampered but detected as tampered. Since α = 3 , the collision rate should be 1 / 2 3 = 0.125 , which is consistent with the results shown in Table 6. Since TPR = 1 FNR , the theoretical TPR is 87.5%. In the first stage detection, the TPR of [17,18,19] and the proposed method are 89.83%, 87.66%, 88.60% and 87.83%, respectively, which are in accordance with the theoretical value. In the secondary detection, the TPR of all methods are up to 99.00%. In the first detection, the PRs are all 100%, which is because these methods do not misjudge untampered blocks as being tampered. However, in the secondary detection, some untampered blocks are mistakenly judged to have been tampered with. Therefore, the PR is slightly reduced.
To further compare the detectability of the proposed method with related works, we conduct additional experiments using two types of tampering. Firstly, these methods are used to embed authentication codes into the Splash image. Then we tamper the marked images by splicing bottles and a cow. The marked image, tampered image, and tampered regions are shown in Figure 10a–c, respectively. In Figure 10b, we obtain the AMBTC trios of bottles firstly, and then splice the decompressed trios onto the marked image. This type of tampering is referred to as Type A. The tampering of cow is done by replacing blocks with other ones of the marked image that have the shortest Euclidian distance to the corresponding blocks of the cow image. This type of tampering is referred to as Type B. Since the method of [19] can only embed authentication code of length 3, we set α = 3 in this experiment for a fair comparison.
Figure 11 shows the results of the second-stage detection with different methods. For the tampering of bottles, [17,18,19] and the proposed method can all obtain a better detection result with 99.99% detection rate. However, the methods of [18,19] do not detect the tampering of cow image, as shown in Figure 9b,c. This is because the generation of authentication codes for their methods is independent of the location information. Yet, both [17] and the proposed method are able to detect both types of tampering with better results, as shown in Figure 9a,d.
In addition to comparing with [17,18,19], we also compare with the existing methods [15,16], as shown in Table 7. In this table, ‘Type A’ and ‘Type B’ represent the tampering approaches of bottles and cow in Figure 10, respectively. As can be seen from the table, all compared methods can detect the tampering of bottles, but only [17] and the proposed method can detect the tampering of cow. This is because these two methods take both bitmaps and location information into account when generating authentication codes. Besides, for each trio, we can find that [15] can only embed 2.8 bits (a digit of base 7), [16,17] can only embed at most 4 bits, and [19] can only embed 3 bits (a digit of base 8). As for [18] and our method, it is possible to embed an authentication code of arbitrary length. In addition, the proposed method uses a better embedding and selection mechanisms than other methods, and thus the image quality is also better, as shown in the above experiments.

5. Conclusions

In this paper, we propose a high quality image authentication method with AMBTC-based authentication. Based on the characteristics of AMBTC, The proposed method generate the authentication codes by using both the original and flipped bitmaps. To improve the image quality, we toggle the bits in the original and flipped bitmaps to generate a series of authentication codes for smooth blocks, and then select the authentication code that causes the least error for embedment. To lower the computational cost, we use a reduced selection mechanism for complex blocks. Moreover, our method uses PPM to embed authentication codes to further enhance the image quality. Experimental results show that our method not only achieves a better tampering detection, but also yields a high marked image quality. The focus of this paper is mainly on improving the detectability and marked image quality. Future work could include a recoverability feature so that tampered areas can be recovered.

Author Contributions

T.C., X.Z. and W.H. contributed to the conceptualization, methodology, and writing of this paper. R.C. and K.C. conceived the simulation setup, formal analysis and conducted the investigation. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bravo-Solorio, S.; Calderon, F.; Li, C.T.; Nandi, A.K. Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit. Signal Process. 2017, 73, 83–92. [Google Scholar] [CrossRef]
  2. Garg, P.; Jain, A.K. An invisible based watermarking technique for biometric image authentication. Mater. Today Proc. 2021, 46. [Google Scholar] [CrossRef]
  3. Mohammed, B.; Ameen, S.Y.; Mohammed, O. Image authentication based on watermarking approach: Review. Asian J. Comput. Sci. Inf. Technol. 2021, 9, 34–51. [Google Scholar]
  4. Qin, C.; Ji, P.; Wang, J.; Chang, C.C. Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 2017, 76, 2267–2287. [Google Scholar] [CrossRef]
  5. Chen, H.; Ni, J.; Hong, W.; Chen, T.S. Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Process. Image Commun. 2016, 46, 1–16. [Google Scholar] [CrossRef]
  6. Zenati, A.; Ouarda, W.; Alimi, A.M. A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimed. Tools Appl. 2021, 6, 18653–18676. [Google Scholar] [CrossRef]
  7. Weng, S.; Pan, J.S. Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding. Inf. Sci. 2016, 369, 144–159. [Google Scholar] [CrossRef]
  8. Zhou, J.; Sun, W.; Dong, L.; Liu, X.; Au, O.C.; Tang, Y.Y. Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 2016, 26, 441–452. [Google Scholar] [CrossRef]
  9. Patra, J.C.; Phua, J.E.; Bornand, C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process. 2010, 20, 1597–1611. [Google Scholar] [CrossRef]
  10. Zairi, M.; Boujiha, T.; Ouelli, A. Improved JPEG image watermarking in data compression domain using block selection strategy. EAI Endorsed Trans. Internet Things 2021, 6, e4. [Google Scholar] [CrossRef]
  11. Xu, S.; Horng, J.H.; Chang, C.C. Reversible data hiding scheme based on VQ prediction and adaptive parametric binary tree labeling for encrypted images. IEEE Access 2021, 9, 55191–55204. [Google Scholar] [CrossRef]
  12. Hong, W.; Zhou, X.Y.; Lou, D.C.; Chen, T.S.; Li, Y. Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques. Inf. Sci. 2018, 463–464, 245–260. [Google Scholar] [CrossRef]
  13. Uma, P.; Vimala, S. Reversible data hiding technique using AMBTC based bitmap manipulation. Int. J. Comput. Appl. 2020, 176, 48–55. [Google Scholar] [CrossRef]
  14. Kim, C.; Yang, C.N. Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches. Appl. Sci. 2021, 11, 1146. [Google Scholar] [CrossRef]
  15. Zhong, H.; Liu, H.; Chang, C.C.; Lin, C.C. A novel fragile watermark-based image authentication scheme for AMBTC-compressed images. J. Inf. Hiding Multimed. Signal Process. 2016, 7, 2073–4212. [Google Scholar]
  16. Li, W.; Lin, C.C.; Pan, J.S. Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimed. Tools Appl. 2016, 75, 4771–4793. [Google Scholar] [CrossRef]
  17. Chen, T.H.; Chang, T.C. On the security of a BTC-based-compression image authentication scheme. Multimed. Tools Appl. 2018, 77, 12979–12989. [Google Scholar] [CrossRef]
  18. Hong, W.; Zhou, X.Y.; Lou, D.C.; Huang, X.Q.; Peng, C. Detectability improved tamper detection scheme for absolute moment block truncation coding compressed images. Symmetry 2018, 10, 318. [Google Scholar] [CrossRef] [Green Version]
  19. Chen, C.C.; Chang, C.C.; Lin, C.C.; Su, G.D. TSIA: A novel image authentication scheme for AMBTC-based compressed images using turtle shell based reference matrix. IEEE Access 2019, 7, 149515–149526. [Google Scholar] [CrossRef]
  20. Hong, W.; Li, D.; Lou, D.C.; Zhou, X.Y.; Chang, C.H. A bit toggling approach for AMBTC tamper detection scheme with high image fidelity. PLoS ONE 2020, 15, e0230997. [Google Scholar] [CrossRef] [Green Version]
  21. Kumar, R.; Kumar, N.; Jung, K.H. Color image steganography scheme using gray invariant in AMBTC compression domain. Multidimens. Syst. Signal Process. 2020, 31, 1145–1162. [Google Scholar] [CrossRef]
  22. Chen, Y.H.; Chang, C.C.; Lin, C.C.; Wang, Z.M. An adaptive reversible data hiding scheme using AMBTC and quantization level difference. Appl. Sci. 2021, 11, 635. [Google Scholar] [CrossRef]
  23. Lema, M.; Mitchell, O. Absolute moment block truncation coding and its application to color image. IEEE Trans. Inf. Forensics Secur. 1984, 10, 507–518. [Google Scholar] [CrossRef]
  24. Delp, E.; Mitchell, O. Image compression using block truncation coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
  25. Hong, W.; Chen, T.S.; Shiu, C.W. Lossless steganography for AMBTC-compressed images. In Proceedings of the 2008 Congress on Image and Signal Processing, Sanya, China, 27–30 May 2008. [Google Scholar]
  26. Chang, C.C.; Liu, Y.; Nguyen, T.S. A novel turtle shell based scheme for data hiding. In Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding & Multimedia Signal Processing, Kitakyushu, Japan, 27–29 August 2014. [Google Scholar]
  27. Hong, W.; Chen, T.S. A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 2012, 7, 176–184. [Google Scholar] [CrossRef]
  28. Liu, L.; Chang, C.C.; Wang, A. Data hiding based on extended turtle shell matrix construction method. Multimed. Tools Appl. 2017, 76, 12233–12250. [Google Scholar] [CrossRef]
  29. Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 1996. [Google Scholar]
  30. The USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 1 July 2021).
  31. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Embedment of TSE and PPM. (a) Partial reference table of R 3 TSE ; (b) Partial reference table of R 3 PPM .
Figure 1. Embedment of TSE and PPM. (a) Partial reference table of R 3 TSE ; (b) Partial reference table of R 3 PPM .
Mathematics 09 02610 g001
Figure 2. Partial reference table of R 4 PPM .
Figure 2. Partial reference table of R 4 PPM .
Mathematics 09 02610 g002
Figure 3. The embedding procedures of the proposed method.
Figure 3. The embedding procedures of the proposed method.
Mathematics 09 02610 g003
Figure 4. The authentication procedures of the proposed method.
Figure 4. The authentication procedures of the proposed method.
Mathematics 09 02610 g004
Figure 5. Eight test images. (a) Lena; (b) Tiffany; (c) House; (d) Jet; (e) Peppers; (f) Splash; (g) Boat; (h) Baboon.
Figure 5. Eight test images. (a) Lena; (b) Tiffany; (c) House; (d) Jet; (e) Peppers; (f) Splash; (g) Boat; (h) Baboon.
Mathematics 09 02610 g005
Figure 6. The tampered Lena image. (a) Marked image; (b) Tampered image; (c) Tampered region.
Figure 6. The tampered Lena image. (a) Marked image; (b) Tampered image; (c) Tampered region.
Mathematics 09 02610 g006
Figure 7. The first and second stage detection results. (a) 1st detection, α = 2 ; (b) 1st detection, α = 4 ; (c) 1st detection, α = 6 ; (d) 2nd detection, α = 2 ; (e) 2nd detection, α = 4 ; (f) 2nd detection, α = 6 .
Figure 7. The first and second stage detection results. (a) 1st detection, α = 2 ; (b) 1st detection, α = 4 ; (c) 1st detection, α = 6 ; (d) 2nd detection, α = 2 ; (e) 2nd detection, α = 4 ; (f) 2nd detection, α = 6 .
Mathematics 09 02610 g007
Figure 8. The tampering of the Jet image. (a) Marked image; (b) Tampered image; (c) Tampered regions.
Figure 8. The tampering of the Jet image. (a) Marked image; (b) Tampered image; (c) Tampered regions.
Mathematics 09 02610 g008
Figure 9. The 1st and 2nd detection results of different methods. (a) 1st stage, [17]; (b) 1st stage, [18]; (c) 1st stage, [19]; (d) 1st stage, proposed method; (e) 2nd stage, [17]; (f) 2nd stage, [18]; (g) 2nd stage, [19]; (h) 2nd stage, proposed method.
Figure 9. The 1st and 2nd detection results of different methods. (a) 1st stage, [17]; (b) 1st stage, [18]; (c) 1st stage, [19]; (d) 1st stage, proposed method; (e) 2nd stage, [17]; (f) 2nd stage, [18]; (g) 2nd stage, [19]; (h) 2nd stage, proposed method.
Mathematics 09 02610 g009
Figure 10. The tampering of Splash image. (a) Marked image; (b) Tampered image; (c) Tampered regions.
Figure 10. The tampering of Splash image. (a) Marked image; (b) Tampered image; (c) Tampered regions.
Mathematics 09 02610 g010
Figure 11. The second stage detection results of different methods. (a) Detection result of [17]; (b) Detection result of [18]; (c) Detection result of [19]; (d) Detection result of the proposed method.
Figure 11. The second stage detection results of different methods. (a) Detection result of [17]; (b) Detection result of [18]; (c) Detection result of [19]; (d) Detection result of the proposed method.
Mathematics 09 02610 g011
Table 1. Comparisons of image quality for different thresholds when α = 2, 4, 6.
Table 1. Comparisons of image quality for different thresholds when α = 2, 4, 6.
α T LenaTiffanyHouseJetPeppersSplashBoatBaboon
225554.0754.2054.6754.5953.9954.3754.0454.05
354.0754.2054.6754.5953.9954.3754.0454.05
254.0654.1954.6654.5853.9954.3654.0454.05
−154.0054.0854.1454.0753.9854.1354.0154.05
425549.3549. 5049.7350.0949.1149.7548.9648.77
649.3549. 5049.7350.0949.1149.7548.9648.77
549.3449.4949.7250.0849.1049.7448.9548.77
−148.7648.7348.8648.8348.8148.7848.7748.75
625544.8145.0344.4645.4144.4445.7943.7743.02
1244.8145.0344.4645.4144.4445.7943.7743.02
1144.8045.0244.4645.4144.4445.7843.7643.02
−142.8842.8242.9142.942.8842.8442.8542.82
Table 2. Different α corresponds to T * .
Table 2. Different α corresponds to T * .
α 2345678
T 3468121520
Table 3. TPR and FNR values for the first and second stage detections.
Table 3. TPR and FNR values for the first and second stage detections.
α 246
Detection stage1st 2nd 1st 2nd 1st 2nd
TPR74.72%95.62%94.55%99.61%98.68%99.90%
FNR25.28%4.38%5.45%0.39%1.32%0.10%
Table 4. Image quality comparisons with other works for α = 2 , 3 , 4 , 6 .
Table 4. Image quality comparisons with other works for α = 2 , 3 , 4 , 6 .
α MethodsLenaTiffanyHouseJetPeppersSplashBoatBaboon
2[17]49.9049.9049.8649.9349.8949.9049.8949.86
[18]51.7551.7951.7751.7751.7151.8051.7651.77
[19]n/an/an/an/an/an/an/an/a
Proposed54.07 54.2054.6754.5953.9954.3754.0454.05
3[17]46.4046.4946.4946.5346.4346.4746.4846.49
[18]48.5648.5848.6648.6448.6248.6148.6248.54
[19]49.7949.8149.9949.9349.7749.8349.7949.72
Proposed51.6851.8252.2152.2851.6251.8951.5851.60
4[17]46.4246.3846.3546.3446.3646.3746.3646.40
[18]45.79 45.7945.8545.7745.7745.8245.7445.74
[19]n/an/an/an/an/an/an/an/a
Proposed49.3549. 5049.7350.0949.1149.7548.9648.77
6[17]n/an/an/an/an/an/an/an/a
[18]39.71 39.7539.739.6939.739.6639.7439.73
[19]n/an/an/an/an/an/an/an/a
Proposed44.8145.0344.4645.4144.4445.7943.7743.02
Table 5. SSIM comparisons with other works for α = 3 .
Table 5. SSIM comparisons with other works for α = 3 .
MethodsLenaTiffanyHouseJetPeppersSplashBoatBaboon
[17]0.9900.9890.9910.9890.9900.9870.9930.997
[18]0.9940.9930.9950.9930.9940.9920.9950.998
[19]0.9950.9950.9960.9950.9950.9940.9970.998
Proposed0.9970.9970.9980.9970.9970.9960.9980.999
Table 6. Comparisons of different methods of TPR, FNR, and PR.
Table 6. Comparisons of different methods of TPR, FNR, and PR.
MethodsStagesTPRFNRPR
[17] 1st 89.83%10.17%100.00%
2nd 99.33%0.67%99.94%
[18] 1st 87.66%12.34%100.00%
2nd 98.78%1.22%99.83%
[19] 1st 88.60%11.39%100.00%
2nd 99.17%0.83%99.83%
Proposed 1st 87.83%12.17%100.00%
2nd 99.67%0.33%99.78%
Table 7. Comparisons with other works.
Table 7. Comparisons with other works.
Methods[15][16][17][18][19]Proposed
Generation of AC Random numbersRandom numbersRandom numbers and bitmapQuantized values and bitmapBitmapBitmap and location information
Generator of ACRandom number generatorRandom number generatorexclusive-orHash functionHash functionHash function
Payload of each trio2.81, 2, 3, 41, 2, 3, 4A digit of base 3–2563A digit of base 3-256
Detectability of Type A YesYesYesYesYesYes
Detectability of Type BNoNoYesNoNoYes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chen, T.; Zhou, X.; Chen, R.; Hong, W.; Chen, K. A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding. Mathematics 2021, 9, 2610. https://doi.org/10.3390/math9202610

AMA Style

Chen T, Zhou X, Chen R, Hong W, Chen K. A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding. Mathematics. 2021; 9(20):2610. https://doi.org/10.3390/math9202610

Chicago/Turabian Style

Chen, Tungshou, Xiaoyu Zhou, Rongchang Chen, Wien Hong, and Kiasheng Chen. 2021. "A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding" Mathematics 9, no. 20: 2610. https://doi.org/10.3390/math9202610

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop