An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies
Abstract
:1. Introduction
2. Related Works
2.1. AMBTC Compression Technique
2.2. The Adaptive Pixel Pair Matching (APPM) Technique
2.3. The Matrix Encoding
3. The Proposed Method
3.1. The Embedment Algorithm of Smooth Blocks
- Step 1: Divide into and , which are employed to generate and carry , respectively.
- Step 2: Use the bitmap , low quantized value , high quantized value , and position information to generate using the following equation:
- Step 3: The 6-bit is divided into 2 groups of 3 bits denoted as and . The matrix encoding described in Section 2.3 is then employed to embed and into and , and we obtain and , respectively.
- Step 4: Concatenate , , and , and we have the marked bitmap . Finally, the marked compressed code is outputted, where .
3.2. The Embedment Algorithm of Complex Blocks
- Step 1: Use the following equation to construct the reference table :
- Step 2: Use the bitmap and position information to generate the 6-bit by
- Step 3: Once is obtained, of base 64 is embedded into the quantized values using APPM to obtain the marked quantized values and , where is the decimal value of .
3.3. Embedding of Smoothness-Changed Blocks
3.4. The Embedding Procedures
- Input: AMBTC compressed codes , key , and parameters and .
- Output: Marked AMBTC codes .
- Step 1: Scan each code in and calculate the difference of and .
- Step 2: If , use Equation (3) to hash , , and to generate the 6-bit . Embed into using the matrix encoding described in Section 2.3 to obtain . Concatenate and , and the marked bitmap is obtained. Then, we have the marked code , where .
- Step 3: If , use the key to generate , and construct the reference table using Equation (4). Then, use the APPM to embed into , and we have . If , the marked code is outputted and . Otherwise, is embedded using the technique described in Section 3.3 to obtain .
- Step 4: Repeat Steps 1–3 until all codes are embedded and output the marked codes , key , and parameters and .
3.5. The Authentication Procedures
- Input: To-be-authenticated codes , key , and parameters and .
- Output: The detection result.
- Step 1: Scan each code in and calculate the difference of and .
- Step 2: If , use Equation (3) to hash , , and to regenerate 6-bit . The matrix encoding is employed to extract from .
- Step 3: If , employ to generate , and construct the by Equation (4). Besides, and are employed to regenerate by Equation (5). Then, use APPM to extract embedded in .
- Step 4: Compare and to judge whether the code has been tampered with. If , the code is untampered with. Otherwise, it is tampered with.
- Step 5: Repeat Steps 1–4 until all blocks have been detected, which refers to the coarse detection in our method.
- Step 6: The refined detection, described here, is used to improve detection accuracy. If the top and bottom, left and right, top left and bottom right, or top right and bottom left blocks of an untampered block have been determined as tampered with, the untampered block is redetermined to be a tampered one. Repeat this procedure until no other blocks are redetermined and we have finished the authentication procedures.
4. Experimental Results
4.1. The Performance of the Proposed Method
4.2. PSNR Comparisons with Prior Works
4.3. Detectability Comparisons with Prior Works
5. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Jasra, B.; Moon, A.H. Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst. Appl. 2022, 206, 117861. [Google Scholar] [CrossRef]
- Hossain, M.S.; Islam, M.T.; Akhtar, Z. Incorporating deep learning into capacitive images for smartphone user authentication. J. Inf. Secur. Appl. 2022, 69, 103290. [Google Scholar] [CrossRef]
- Qin, C.; Ji, P.; Zhang, X.; Dong, J.; Wang, J. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 2017, 138, 280–293. [Google Scholar] [CrossRef]
- You, C.; Zheng, H.; Guo, Z.; Wang, T.; Wu, X. Tampering detection and localization base on sample guidance and individual camera device convolutional neural network features. Expert Syst. 2022, 40, e13102. [Google Scholar] [CrossRef]
- Hussan, M.; Parah, S.A.; Jan, A.; Qureshi, G.J. Hash-based image watermarking technique for tamper detection and localization. Health Technol. 2022, 12, 385–400. [Google Scholar] [CrossRef]
- Zhao, D.; Tian, X. A Multiscale Fusion Lightweight Image-Splicing Tamper-Detection Model. Electronics 2022, 11, 2621. [Google Scholar] [CrossRef]
- Hussan, M.; Parah, S.A.; Jan, A.; Qureshi, G.J. Self-embedding framework for tamper detection and restoration of color images. Multimed. Tools Appl. 2022, 81, 18563–18594. [Google Scholar] [CrossRef]
- Zhou, X.; Hong, W.; Weng, S.; Chen, T.S.; Chen, J. Reversible and recoverable authentication method for demosaiced images using adaptive coding technique. J. Inf. Secur. Appl. 2020, 55, 102629. [Google Scholar] [CrossRef]
- Wang, Q.; Xiong, D.; Alfalou, A.; Brosseau, C. Optical image authentication scheme using dual polarization decoding configuration. Opt. Lasers Eng. 2019, 112, 151–161. [Google Scholar] [CrossRef]
- Molina, J.; Ponomaryov, V.; Reyes, R.; Sadovnychiy, S.; Cruz, C. Watermarking framework for authentication and self-recovery of tampered colour images. IEEE Lat. Am. Trans. 2020, 18, 631–638. [Google Scholar] [CrossRef]
- Wu, X.; Yang, C. Invertible secret image sharing with steganography and authentication for AMBTC compressed images. Signal Process. Image 2019, 78, 437–447. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, S.; Qian, Z.; Feng, G. Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 2010, 90, 3026–3036. [Google Scholar] [CrossRef]
- Hong, W.; Wu, J.; Lou, D.C.; Zhou, X.; Chen, J. An AMBTC authentication scheme with recoverability using matrix encoding and side match. IEEE Access 2021, 9, 133746–133761. [Google Scholar] [CrossRef]
- Zhang, T.; Weng, S.; Wu, Z.; Lin, J.; Hong, W. Adaptive encoding based lossless data hiding method for VQ compressed images using tabu search. Inform. Sci. 2022, 602, 128–142. [Google Scholar] [CrossRef]
- Pan, Z.; Wang, L. Novel reversible data hiding scheme for two-stage VQ compressed images based on search-order coding. J. Vis. Commun. Image R. 2018, 50, 186–198. [Google Scholar] [CrossRef]
- Li, Y.; Chang, C.C.; Mingxing, H. High capacity reversible data hiding for VQ-compressed images based on difference transformation and mapping technique. IEEE Access 2020, 8, 32226–32245. [Google Scholar] [CrossRef]
- Battiato, S.; Giudice, O.; Guarnera, F.; Puglisi, G. CNN-based first quantization estimation of double compressed JPEG images. J. Vis. Commun. Image R. 2022, 89, 103635. [Google Scholar] [CrossRef]
- Yao, H.; Mao, F.; Qin, C.; Tang, Z. Dual-JPEG-image reversible data hiding. Inform. Sci. 2021, 563, 130–149. [Google Scholar] [CrossRef]
- Cogranne, R.; Giboulot, Q.; Bas, P. Efficient steganography in JPEG images by minimizing performance of optimal detector. IEEE Trans. Inf. Foren. Sec. 2022, 17, 1328–1343. [Google Scholar] [CrossRef]
- Chen, T.S.; Zhou, X.; Chen, R.; Hong, W.; Chen, K. A high fidelity authentication scheme for AMBTC compressed image using reference table encoding. Mathematics 2021, 9, 2610. [Google Scholar] [CrossRef]
- Lin, C.C.; Liu, X.; Zhou, J.; Tang, C.Y. An image authentication and recovery scheme based on turtle Shell algorithm and AMBTC-compression. Multimed. Tools Appl. 2022, 81, 39431–39452. [Google Scholar] [CrossRef]
- Hu, Y.C.; Lo, C.C.; Chen, W.L.; Wen, C.H. Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Imaging 2013, 22, 013012. [Google Scholar] [CrossRef]
- Li, W.; Lin, C.C.; Pan, J.S. Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimed. Tools Appl. 2016, 75, 4771–4793. [Google Scholar] [CrossRef]
- Chen, T.H.; Chang, T.C. On the security of a BTC-based-compression image authentication scheme. Multimed. Tools Appl. 2018, 77, 12979–12989. [Google Scholar] [CrossRef]
- Hong, W.; Zhou, X.Y.; Lou, D.C.; Huang, X.Q.; Peng, C. Detectability improved tamper detection scheme for absolute moment block truncation coding compressed images. Symmetry 2018, 10, 318. [Google Scholar] [CrossRef] [Green Version]
- Hong, W.; Chen, M.J.; Chen, T.S.; Huang, C.C. An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multimed. Tools Appl. 2018, 77, 4677–4695. [Google Scholar] [CrossRef]
- Su, G.D.; Chang, C.C.; Lin, C.C. High-precision authentication scheme based on matrix encoding for AMBTC-compressed images. Symmetry 2019, 11, 996. [Google Scholar] [CrossRef] [Green Version]
- Lema, M.; Mitchell, O. Absolute moment block truncation coding and its application to color image. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
- Hong, W.; Chen, T.S. A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Foren. Sec. 2012, 7, 176–184. [Google Scholar] [CrossRef]
- Liu, S.; Fu, Z.; Yu, B. Rich QR codes with three-layer information using Hamming code. IEEE Access 2019, 7, 78640–78651. [Google Scholar] [CrossRef]
- Hamming, R.W. Error detecting and error correcting codes. Bell Labs Tech. J. 1950, 29, 147–160. [Google Scholar] [CrossRef]
- Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 1996. [Google Scholar]
- The USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 10 January 2023).
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed]
- BOWS-2 Image Database. Available online: http://bows2.ec-lille.fr/ (accessed on 10 January 2023).
T | Metric | Lena | Jet | Baboon | Tiffany | Sailboat | Splash | Peppers | House |
---|---|---|---|---|---|---|---|---|---|
PSNR | 41.02 | 41.02 | 41.00 | 41.01 | 41.05 | 41.02 | 41.02 | 41.06 | |
SSIM | 0.9564 | 0.9505 | 0.9867 | 0.9612 | 0.9723 | 0.9501 | 0.9613 | 0.9654 | |
PSNR | 41.08 | 41.14 | 41.01 | 41.09 | 41.07 | 41.11 | 41.06 | 41.12 | |
SSIM | 0.9574 | 0.9523 | 0.9867 | 0.9622 | 0.9727 | 0.9514 | 0.9618 | 0.9664 | |
PSNR | 41.31 | 41.80 | 41.01 | 41.45 | 41.21 | 41.63 | 41.18 | 41.84 | |
SSIM | 0.9613 | 0.9638 | 0.9867 | 0.9666 | 0.9746 | 0.9580 | 0.9637 | 0.9788 | |
PSNR | 41.62 | 42.39 | 41.02 | 41.80 | 41.34 | 42.04 | 41.34 | 42.02 | |
SSIM | 0.9660 | 0.9727 | 0.9868 | 0.9709 | 0.9764 | 0.9626 | 0.9657 | 0.9810 | |
PSNR | 42.03 | 42.94 | 41.03 | 42.32 | 41.49 | 42.61 | 41.57 | 42.22 | |
SSIM | 0.9710 | 0.9784 | 0.9870 | 0.9756 | 0.9780 | 0.9679 | 0.9683 | 0.9828 | |
PSNR | 42.31 | 43.19 | 41.04 | 42.64 | 41.59 | 43.06 | 41.79 | 42.39 | |
SSIM | 0.9738 | 0.9805 | 0.9870 | 0.9780 | 0.9792 | 0.9714 | 0.9707 | 0.9844 | |
PSNR | 42.48 | 43.32 | 41.05 | 42.78 | 41.64 | 43.31 | 41.93 | 42.48 | |
SSIM | 0.9748 | 0.9808 | 0.9871 | 0.9786 | 0.9797 | 0.9727 | 0.9716 | 0.9849 | |
PSNR | 42.49 | 43.31 | 41.04 | 42.77 | 41.63 | 43.33 | 41.94 | 42.47 | |
SSIM | 0.9741 | 0.9806 | 0.9870 | 0.9783 | 0.9793 | 0.9722 | 0.9711 | 0.9847 | |
PSNR | 42.39 | 43.26 | 40.99 | 42.70 | 41.53 | 43.24 | 41.83 | 42.43 | |
SSIM | 0.97301 | 0.9798 | 0.9865 | 0.9776 | 0.9783 | 0.9711 | 0.9696 | 0.9843 | |
PSNR | 42.24 | 43.17 | 40.90 | 42.55 | 41.37 | 43.09 | 41.65 | 42.35 | |
SSIM | 0.9719 | 0.9793 | 0.9855 | 0.9766 | 0.9765 | 0.9698 | 0.9675 | 0.9837 | |
PSNR | 42.06 | 43.02 | 40.78 | 42.33 | 41.13 | 42.93 | 41.41 | 42.22 | |
SSIM | 0.9705 | 0.9786 | 0.9843 | 0.9753 | 0.9747 | 0.9688 | 0.9654 | 0.9830 |
Image | Number of Smooth Blocks | Ratio of Smooth Blocks | PSNR |
---|---|---|---|
Lena | 8695 | 53.07% | 42.49 |
Jet | 9758 | 59.56% | 43.31 |
Baboon | 1146 | 6.99% | 41.04 |
Tiffany | 9518 | 58.09% | 42.78 |
Sailboat | 3638 | 22.20% | 41.64 |
Splash | 11,820 | 72.14% | 43.33 |
Peppers | 5524 | 33.71% | 41.91 |
House | 6616 | 40.38% | 42.47 |
Method | Lena | Jet | Baboon | Tiffany | Sailboat | Splash | Peppers | House | Average |
---|---|---|---|---|---|---|---|---|---|
[25] | 39.71 | 39.69 | 39.73 | 39.76 | 39.67 | 39.67 | 39.70 | 39.70 | 39.71 |
[26] | 40.98 | 41.08 | 40.96 | 40.89 | 40.96 | 40.98 | 40.99 | 40.93 | 40.97 |
[27] | 40.32 | 40.07 | 40.69 | 40.22 | 40.55 | 40.13 | 40.49 | 40.25 | 40.35 |
Proposed | 42.49 | 43.31 | 41.04 | 42.78 | 41.64 | 43.33 | 41.94 | 42.47 | 42.36 |
Method | [25] | [26] | [27] | Proposed |
---|---|---|---|---|
Number of tampered blocks (NTB) | 19,712 | |||
Tampering rate | 7.52% | |||
True positive (TP) | 19,680 | 19,696 | 19,696 | 19,712 |
False negative (FN) | 32 | 16 | 16 | 0 |
The refined detection rate | 99.83% | 99.91% | 99.91% | 100% |
Method | Components for Generating Authentication Codes | Embedding Techniques | Detection of Bananas | Detection of Orange | Detection of Watermelon |
---|---|---|---|---|---|
[20] | Bitmaps and position | APPM | Yes | No | Yes |
[21] | Recovery codes and position | Turtle Shell | Yes | Yes | Yes |
[25] | MSBs of quantized values and bitmaps | LSB | No | Yes | Yes |
[26] | Bitmaps and position | APPM | Yes | No | Yes |
[27] | Bitmaps and position | Matrix encoding | Yes | Yes | No |
Proposed | quantized values, bitmaps and position | APPM and matrix encoding | Yes | Yes | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, X.; Chen, J.; Yang, G.; Lin, Z.-F.; Hong, W. An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies. Appl. Sci. 2023, 13, 1402. https://doi.org/10.3390/app13031402
Zhou X, Chen J, Yang G, Lin Z-F, Hong W. An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies. Applied Sciences. 2023; 13(3):1402. https://doi.org/10.3390/app13031402
Chicago/Turabian StyleZhou, Xiaoyu, Jeanne Chen, Guangsong Yang, Zheng-Feng Lin, and Wien Hong. 2023. "An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies" Applied Sciences 13, no. 3: 1402. https://doi.org/10.3390/app13031402
APA StyleZhou, X., Chen, J., Yang, G., Lin, Z. -F., & Hong, W. (2023). An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies. Applied Sciences, 13(3), 1402. https://doi.org/10.3390/app13031402