TY - JOUR
T1 - A bit toggling approach for AMBTC tamper detection scheme with high image fidelity
AU - Hong, Wien
AU - Li, Dan
AU - Lou, Der Chyuan
AU - Zhou, Xiaoyu
AU - Chang, Chien Hung
N1 - Publisher Copyright:
© 2020 Hong et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
PY - 2020/4
Y1 - 2020/4
N2 - The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. However, the marked image qualities of these schemes can be enhanced, and their authentication methods may fail to detect some special tampering. We propose a secure AMBTC tamper detection scheme that preserves high image fidelity with excellent detectability. In the proposed approach, a bit in bitmaps of AMBTC codes is sequentially toggled to generate a set of authentication codes. The one that causes the least distortion is embedded into the quantization levels with the guidance of a key-generated reference table (RT). Without the correct key, the same reference table cannot be constructed. Therefore, the proposed method is able to detect various kinds of malicious tampering, including those special tampering techniques designed for RT-based authentication schemes. The proposed method not only offers better image quality, but also provides an excellent and satisfactory detectability as compared with previous works.
AB - The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. However, the marked image qualities of these schemes can be enhanced, and their authentication methods may fail to detect some special tampering. We propose a secure AMBTC tamper detection scheme that preserves high image fidelity with excellent detectability. In the proposed approach, a bit in bitmaps of AMBTC codes is sequentially toggled to generate a set of authentication codes. The one that causes the least distortion is embedded into the quantization levels with the guidance of a key-generated reference table (RT). Without the correct key, the same reference table cannot be constructed. Therefore, the proposed method is able to detect various kinds of malicious tampering, including those special tampering techniques designed for RT-based authentication schemes. The proposed method not only offers better image quality, but also provides an excellent and satisfactory detectability as compared with previous works.
UR - http://www.scopus.com/inward/record.url?scp=85083508004&partnerID=8YFLogxK
U2 - 10.1371/journal.pone.0230997
DO - 10.1371/journal.pone.0230997
M3 - 文章
C2 - 32298280
AN - SCOPUS:85083508004
SN - 1932-6203
VL - 15
JO - PLoS ONE
JF - PLoS ONE
IS - 4
M1 - e0230997
ER -