Abstract
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AMBTC) compressed images has been attracting more attention due to its integrity authentication concerns. Thus, this paper proposes an effective N-variant AMBTC based image authentication scheme for AMBTC compressed images. First, a novel AMBTC compression code is derived using a variant AMBTC technique that can provide a better quality of compressed images. Then, each AMBTC compression code is further eliminated into a version requiring fewer bits using the proposed N-variant AMBTC technique, and those vacated N-bits are used to conceal authentication codes, which is generated by hashing the AMBTC compression code and location information. Experimental results confirm that the proposed scheme has superior stability and accuracy in tampering detection while providing better visual quality of the watermarked image.
Similar content being viewed by others
Data availability
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
References
Chang CC, Li CT (2019) Algebraic Secret Sharing Using Privacy Homomorphisms for IoT-based Healthcare Systems. Math Biosci Eng 16(5):3367–3381
Chang CC, Liu Y, and Nguyen TS (2014) “A Novel Turtle Shell based Scheme for Data Hiding,” in Proceeding of 2014 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 89–93
Chang CC, Li CT, Shi YQ (2018) Privacy-aware Reversible Watermarking in Cloud Computing Environments. IEEE Access 6(1):70720–70733
Chang CC, Li CT, Chen K (2019) Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues. IEEE Access 7(1):54117–54132
Chen TH, Chang TC (2018) On the Security of a BTC-Based-Compression Image Authentication Scheme. Multimedia Tools and Applications 77(10):12979–12989
Chen CC, Chang CC, Lin CC, Su GD (2019) TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix. IEEE Access 7:149515–149526
Chen T, Zhou X, Chen R, Hong W, Chen K (2021) A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding. Mathematics 9(20):2610
Cvitić I, Peraković D, Periša M, Gupta BB (2021) Ensemble Machine Learning Approach for Classification of IoT Devices in Smart Home. Int J Mach Learn Cybern 12(11):3179–3202
Datta K, Jana B, Chakraborty MD (2022) Two-layers Robust Data Hiding Scheme for Highly Compressed Image Exploiting AMBTC with Difference Expansion. Journal of King Saud University-Computer and Information Sciences 34(8):5240–5260
Gupta BB, Li KC, Leung VCM, Psannis KE, Yamaguchi S (2021) Blockchain-assisted Secure Fine-grained Searchable Encryption for A Cloud-based Healthcare Cyber-physical System. IEEE/CAA Journal of Automatica Sinica 8(12):1877–1890
Hong W, Chen M, Chen TS, Huang CC (2018) An Efficient Authentication Method for AMBTC Compressed Images Using Adaptive Pixel Pair Matching. Multimedia Tools and Applications 77(4):4677–4695
Hong W, Zhou X, Lou DC, Huang X, Peng C (2018) Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images. Symmetry 10(8):318
Hong W, Li D, Lou DC, Zhou X, Chang CH (2020) A Bit Toggling Approach for AMBTC Tamper Detection Scheme with High Image Fidelity. PLoS ONE 15(4):e0230997
Horng MH (2012) Vector Quantization Using the Firefly Algorithm for Image Compression. Expert Syst Appl 39(1):1078–1091
Hu YC, Chen WL, Lo CC, Wu CM (2013) A Novel Tamper Detection Scheme for BTC-Compressed Images. Opto-Electron Rev 21(1):137–146
Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint Image Coding and Image Authentication Based on Absolute Moment Block Truncation Coding. J Electron Imaging 22(1):013012
Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-Based Tamper Detection Scheme for BTC-Compressed Images Based on Quantization Levels Modification. International Journal of Security and Its Applications 7(3):11–32
Lema M, Mitchell O (1984) Absolute Moment Block Truncation Coding and Its Application to Color Images. IEEE Trans Commun 32(10):1148–1157
Li W, Lin CC, Pan JS (2016) Novel Image Authentication Scheme with Fine Image Quality for BTC-Based Compressed Images. Multimedia Tools and Applications 75(8):4771–4793
Lin CC, Huang Y, Tai WL (2014) A High-Quality Image Authentication Scheme for AMBTC-Compressed Images. KSII Trans Internet Inf Syst 12:4588–4603
Lin CC, Huang Y, Tai WL (2017) A Novel Hybrid Image Authentication Scheme Based on Absolute Moment Block Truncation Coding. Multimedia Tools and Applications 76(1):463–488
Linde Y, Buzo A, Gray R (1980) An Algorithm for Vector Quantizer Design. IEEE Trans Commun 28(1):84–95
Mani N, Moh M, Moh TS (2021) Defending Deep Learning Models Against Adversarial Attacks. International Journal of Software Science and Computational Intelligence 13(1):72–89
Nguyen TS, Chang CC, Chung TFA (2014) Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images. KSII Trans Internet Inf Syst 8(6):2005–2021
Nguyen TS, Chang CC, Lin CC (2022) High Capacity Reversible Data Hiding Scheme based on AMBTC for Encrypted Images. Journal of Internet Technology 23(2):255–266
Su GD, Xu SW, Cai BL (2018) Indoor Positioning Method Based on Dynamic Centroid Iteration and Error Correction. Computer Systems and Applications 27(11):265–270
Su GD, Chang CC, Lin CC (2019) High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry 11(8):996
Su GD, Liu Y, Chang CC (2019) A Square Lattice Oriented Reversible Information Hiding Scheme with Reversibility and Adaptivity for Dual Images. J Vis Commun Image Represent 64:102618
Su GD, Chang CC, Lin CC (2020) A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images. IEEE Access 8(1):26984–27000
Tai WL, Liao ZJ (2018) Image Self-Recovery with Watermark Self-Embedding. Signal Processing: Image Communication 65:11–25
Tewari A, Gupta BB (2017) Cryptanalysis of A Novel Ultra-lightweight Mutual Authentication Protocol for IoT Devices using RFID Tags. J Supercomput 73(3):1085–1102
Tewari A, Gupta BB (2020) Secure Timestamp-based Mutual Authentication Protocol for IoT devices using RFID Tags. Int J Semant Web Inf Syst 16(3):20–34
Xu L, Zhang JQ, Yan Y (2004) A Wavelet-Based Multisensor Data Fusion Algorithm. IEEE Trans Instrum Meas 53(6):1539–1545
Zhong H, Liu H, Chang CC, Lin CC (2016) A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. Journal of Information Hiding and Multimedia Signal Processing 7(2):362–375
Zhou Z, Su Y, Zhang Y, Xia Z, Du S, Gupta BB, Qi L (2021) Coverless Information Hiding based on Probability Graph Learning for Secure Communication in IoT Environment. IEEE Internet Things J 9(12):9332–9341
Acknowledgements
This work was supported in part by the National of Science and Technology Council, Taiwan, under MOST 110-2410-H-167-004, in party by the National Natural Science Foundation of China under Grant 62272103, and in part by the Natural Science Foundation of Fujian Province under Grant Nos. 2020J01300, 2022J01971, 2022J01974 and 2022J01975.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Su, GD., Chang, CC. & Lin, CC. An effective compressed image authentication scheme based on N-variant AMBTC. Multimed Tools Appl 83, 3801–3829 (2024). https://doi.org/10.1007/s11042-023-15486-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15486-8