Skip to main content
Log in

An effective compressed image authentication scheme based on N-variant AMBTC

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AMBTC) compressed images has been attracting more attention due to its integrity authentication concerns. Thus, this paper proposes an effective N-variant AMBTC based image authentication scheme for AMBTC compressed images. First, a novel AMBTC compression code is derived using a variant AMBTC technique that can provide a better quality of compressed images. Then, each AMBTC compression code is further eliminated into a version requiring fewer bits using the proposed N-variant AMBTC technique, and those vacated N-bits are used to conceal authentication codes, which is generated by hashing the AMBTC compression code and location information. Experimental results confirm that the proposed scheme has superior stability and accuracy in tampering detection while providing better visual quality of the watermarked image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Chang CC, Li CT (2019) Algebraic Secret Sharing Using Privacy Homomorphisms for IoT-based Healthcare Systems. Math Biosci Eng 16(5):3367–3381

    Article  MathSciNet  Google Scholar 

  2. Chang CC, Liu Y, and Nguyen TS (2014) “A Novel Turtle Shell based Scheme for Data Hiding,” in Proceeding of 2014 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 89–93

  3. Chang CC, Li CT, Shi YQ (2018) Privacy-aware Reversible Watermarking in Cloud Computing Environments. IEEE Access 6(1):70720–70733

    Article  Google Scholar 

  4. Chang CC, Li CT, Chen K (2019) Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues. IEEE Access 7(1):54117–54132

    Article  Google Scholar 

  5. Chen TH, Chang TC (2018) On the Security of a BTC-Based-Compression Image Authentication Scheme. Multimedia Tools and Applications 77(10):12979–12989

    Article  Google Scholar 

  6. Chen CC, Chang CC, Lin CC, Su GD (2019) TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix. IEEE Access 7:149515–149526

    Article  Google Scholar 

  7. Chen T, Zhou X, Chen R, Hong W, Chen K (2021) A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding. Mathematics 9(20):2610

    Article  Google Scholar 

  8. Cvitić I, Peraković D, Periša M, Gupta BB (2021) Ensemble Machine Learning Approach for Classification of IoT Devices in Smart Home. Int J Mach Learn Cybern 12(11):3179–3202

    Article  Google Scholar 

  9. Datta K, Jana B, Chakraborty MD (2022) Two-layers Robust Data Hiding Scheme for Highly Compressed Image Exploiting AMBTC with Difference Expansion. Journal of King Saud University-Computer and Information Sciences 34(8):5240–5260

    Article  Google Scholar 

  10. Gupta BB, Li KC, Leung VCM, Psannis KE, Yamaguchi S (2021) Blockchain-assisted Secure Fine-grained Searchable Encryption for A Cloud-based Healthcare Cyber-physical System. IEEE/CAA Journal of Automatica Sinica 8(12):1877–1890

    Article  Google Scholar 

  11. Hong W, Chen M, Chen TS, Huang CC (2018) An Efficient Authentication Method for AMBTC Compressed Images Using Adaptive Pixel Pair Matching. Multimedia Tools and Applications 77(4):4677–4695

    Article  Google Scholar 

  12. Hong W, Zhou X, Lou DC, Huang X, Peng C (2018) Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images. Symmetry 10(8):318

    Article  Google Scholar 

  13. Hong W, Li D, Lou DC, Zhou X, Chang CH (2020) A Bit Toggling Approach for AMBTC Tamper Detection Scheme with High Image Fidelity. PLoS ONE 15(4):e0230997

    Article  Google Scholar 

  14. Horng MH (2012) Vector Quantization Using the Firefly Algorithm for Image Compression. Expert Syst Appl 39(1):1078–1091

    Article  Google Scholar 

  15. Hu YC, Chen WL, Lo CC, Wu CM (2013) A Novel Tamper Detection Scheme for BTC-Compressed Images. Opto-Electron Rev 21(1):137–146

    Article  Google Scholar 

  16. Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint Image Coding and Image Authentication Based on Absolute Moment Block Truncation Coding. J Electron Imaging 22(1):013012

    Article  Google Scholar 

  17. Hu YC, Lo CC, Wu CM, Chen WL, Wen CH (2013) Probability-Based Tamper Detection Scheme for BTC-Compressed Images Based on Quantization Levels Modification. International Journal of Security and Its Applications 7(3):11–32

    Google Scholar 

  18. Lema M, Mitchell O (1984) Absolute Moment Block Truncation Coding and Its Application to Color Images. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  19. Li W, Lin CC, Pan JS (2016) Novel Image Authentication Scheme with Fine Image Quality for BTC-Based Compressed Images. Multimedia Tools and Applications 75(8):4771–4793

    Article  Google Scholar 

  20. Lin CC, Huang Y, Tai WL (2014) A High-Quality Image Authentication Scheme for AMBTC-Compressed Images. KSII Trans Internet Inf Syst 12:4588–4603

    Google Scholar 

  21. Lin CC, Huang Y, Tai WL (2017) A Novel Hybrid Image Authentication Scheme Based on Absolute Moment Block Truncation Coding. Multimedia Tools and Applications 76(1):463–488

    Article  Google Scholar 

  22. Linde Y, Buzo A, Gray R (1980) An Algorithm for Vector Quantizer Design. IEEE Trans Commun 28(1):84–95

    Article  Google Scholar 

  23. Mani N, Moh M, Moh TS (2021) Defending Deep Learning Models Against Adversarial Attacks. International Journal of Software Science and Computational Intelligence 13(1):72–89

    Article  Google Scholar 

  24. Nguyen TS, Chang CC, Chung TFA (2014) Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images. KSII Trans Internet Inf Syst 8(6):2005–2021

    Article  Google Scholar 

  25. Nguyen TS, Chang CC, Lin CC (2022) High Capacity Reversible Data Hiding Scheme based on AMBTC for Encrypted Images. Journal of Internet Technology 23(2):255–266

    Article  Google Scholar 

  26. Su GD, Xu SW, Cai BL (2018) Indoor Positioning Method Based on Dynamic Centroid Iteration and Error Correction. Computer Systems and Applications 27(11):265–270

    Google Scholar 

  27. Su GD, Chang CC, Lin CC (2019) High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry 11(8):996

    Article  Google Scholar 

  28. Su GD, Liu Y, Chang CC (2019) A Square Lattice Oriented Reversible Information Hiding Scheme with Reversibility and Adaptivity for Dual Images. J Vis Commun Image Represent 64:102618

    Article  Google Scholar 

  29. Su GD, Chang CC, Lin CC (2020) A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images. IEEE Access 8(1):26984–27000

    Article  Google Scholar 

  30. Tai WL, Liao ZJ (2018) Image Self-Recovery with Watermark Self-Embedding. Signal Processing: Image Communication 65:11–25

    Google Scholar 

  31. Tewari A, Gupta BB (2017) Cryptanalysis of A Novel Ultra-lightweight Mutual Authentication Protocol for IoT Devices using RFID Tags. J Supercomput 73(3):1085–1102

    Article  Google Scholar 

  32. Tewari A, Gupta BB (2020) Secure Timestamp-based Mutual Authentication Protocol for IoT devices using RFID Tags. Int J Semant Web Inf Syst 16(3):20–34

    Article  Google Scholar 

  33. Xu L, Zhang JQ, Yan Y (2004) A Wavelet-Based Multisensor Data Fusion Algorithm. IEEE Trans Instrum Meas 53(6):1539–1545

    Article  Google Scholar 

  34. Zhong H, Liu H, Chang CC, Lin CC (2016) A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. Journal of Information Hiding and Multimedia Signal Processing 7(2):362–375

    Google Scholar 

  35. Zhou Z, Su Y, Zhang Y, Xia Z, Du S, Gupta BB, Qi L (2021) Coverless Information Hiding based on Probability Graph Learning for Secure Communication in IoT Environment. IEEE Internet Things J 9(12):9332–9341

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National of Science and Technology Council, Taiwan, under MOST 110-2410-H-167-004, in party by the National Natural Science Foundation of China under Grant 62272103, and in part by the Natural Science Foundation of Fujian Province under Grant Nos. 2020J01300, 2022J01971, 2022J01974 and 2022J01975.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chia-Chen Lin.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Su, GD., Chang, CC. & Lin, CC. An effective compressed image authentication scheme based on N-variant AMBTC. Multimed Tools Appl 83, 3801–3829 (2024). https://doi.org/10.1007/s11042-023-15486-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15486-8

Keywords

Navigation