Next Article in Journal
A Novel Noise Suppression Channel Estimation Method Based on Adaptive Weighted Averaging for OFDM Systems
Next Article in Special Issue
Routing for Hazardous Materials Transportation in Urban Areas
Previous Article in Journal
The Standard Model of Particle Physics with Diracian Neutrino Sector
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images

1
The School of Electronic and Information Engineering, Fuqing Branch of Fujian Normal University, Fuzhou 350300, China
2
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
3
Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion, Fujian University, Fuzhou 350300, China
4
Department of Computer Science and Information Management, Providence University, Taichung 433, Taiwan
*
Author to whom correspondence should be addressed.
Symmetry 2019, 11(8), 996; https://doi.org/10.3390/sym11080996
Submission received: 2 July 2019 / Revised: 23 July 2019 / Accepted: 28 July 2019 / Published: 3 August 2019
(This article belongs to the Special Issue Symmetry in Engineering Sciences II)

Abstract

:
In this paper, a high-precision image authentication scheme for absolute moment block truncation coding (AMBTC)-compressed images is presented. For each block, two sub-bitmaps are conducted using the symmetrical separation, and the six-bit authentication code is symmetrically assigned to two sub-codes, which is virtually embedded into sub-bitmaps using the matrix encoding later. To overcome distortion caused by modifications to the bitmap, the corresponding to-be-flipped bit-location information is recorded instead of flipping these bits of the bitmap directly. Then, the bit-location information is inserted into quantization levels based on adjusted quantization level matching. In contrast to previous studies, the proposed scheme offers a significantly improved tampering detection ability, especially in the first hierarchical tampering detection without remediation measures, with an average tampering detection rate of up to 98.55%. Experimental results show that our approach provides a more stable and reliable tampering detection performance and sustains an acceptable visual quality.

1. Introduction

Recently, as engineering technology has rapidly developed, the performance of computers has become increasingly stronger in terms of computing ability, storage capacity, etc. At the same time, the higher transmission capacity offered by wired/wireless networks allows users to share data anywhere, anytime. Obviously, digital images can be conveniently and transparently transmitted via the Internet; however, the Internet cannot always promise reliable and secure transmission, since it is openly accessible. In other words, it is easy for an intruder to intercept data transmitted over the Internet and then corrupt them, intentionally or non-intentionally. For example, attackers can insert vulgar words into a digital image in an imperceptible manner. Such malicious behavior presents a huge challenge to the security, usability, and integrity of personal information. Therefore, it is urgent to protect the integrity and verifiability of the digital image. Under this scenario, it is expected that a technique is provided to solve this problem.
Researchers have conducted a series of scientific studies on image authentication. Roughly, authentication methods can be classified into two categories: Digital signature-based methods [1,2,3,4] and digital watermark-based methods [5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31]. Generally, the digital signature-based method performs the encryption of the hashed results of the features of the image using a private key to form a unique signature, which will be used later for authentication. The process of authentication can be implemented by comparing the hashing result of the image under question and the original hashed version, which can be decrypted from the signature using an associated public key. By this way, the digital signature-based method performs well on image authentication because it is extremely sensitive to any kind of modification to the image, even if only one bit has been modified. Sometimes, the digital image may be allowed a little distortion in some applications, as long as the tamper regions can be localized precisely. Unfortunately, the digital signature-based method is not workable under this scenario.
The digital watermark-based method imperceptibly embeds relevant or irrelevant information called the authentication code (AC) into a digital image. The digital watermark-based method includes three categories: Fragile, semi-fragile, and robust watermarking. Of these, fragile watermarking embeds the authentication code into the cover image and makes it very sensitive to the modification of the image so that it can be used to verify its authenticity. In the authentication phase, receiver(s) can judge whether the image has been tampered with by comparing the extracted and recalculated authentication code. If they are the same, the received image has not been tampered with, and vice versa.
In recent decades, several forms of fragile watermarking-based image authentication have been proposed. An early fragile watermarking-based method was proposed by [5], where the authentication code is generated from the parity check of the pixel value and embedded into the least significant bit (LSB) of the original image. A possibility of false judgement exists since the tampered 1 LSB could be the same as the computed parity check value of the tampered 7 most significant bits (MSBs). Other fragile watermarking methods based on cryptographic theory were presented by [6,7,8]. Here, authentication codes are derived from a hashing function with various inputs, such as the image content, image index, block index, and pseudo-random number. These methods offer acceptable tampering detection performance. However, some of them could not withstand a vector quantization attack [9] or the tampering coincidence problem [10]. To overcome those problems, other fragile watermarking strategy-based block mappings were proposed by [11,12,13,14,15,16]. In these schemes, the original image is divided into non-overlapping blocks and the authentication code is generated by employing different kinds of technologies for each block, including the discrete cosine transform (DCT)-based method [11,12], the singular value decomposition (SVD)-based method [13,14], and the coding-based method [15,16]. Then, the authentication code of block is scrambled, mapped to the other block, and then inserted into it. The block mapping is one-to-one. Verification is conducted by comparing the extracted and recalculated authentication code. These schemes [11,12,13,14,15] also adopt a multi-hierarchical tampering detection strategy to improve the tampering detection rate; for example, a first hierarchical tampering detection strategy is used to initially identify the tampered area and a second hierarchical tampering detection strategy serves as a remediation measure. As a consequence, these approaches have high precision in tampering detection. Hence, their schemes make it more probable that the tampering region can be restored with respect to satisfactory recovered image quality.
Image authentication technology is also widely used in the compression domain. The aim of image compression algorithms, such as joint photographic experts group (JPEG) [17,18], vector quantization (VQ) encoding [19,32], and absolute moment block truncation coding (AMBTC) [33], is to reduce the size of an image to alleviate the burden of data communication. Of these, AMBTC is a variation of block truncation coding (BTC) [34]. Considering the BTC family is simple and less computationally complex while AMBTC offers better image quality than BTC, many scholars have proposed image authentication schemes for either BTC- or AMBTC-compressed images in the last decade. In 2004, Tu and Hsu [20] proposed a copyright protection scheme for digital images based on BTC. The authentication code, called the ownership share, is constructed by combining the determined authentication code with the binary image generated from the permuted host image using BTC. It is stored by a trusted third party for future authentication. On average, this scheme can extract the authentication code at around 92.13%. In 2009, Jiang et al. [21] proposed a fragile watermarking method that inserts the authentication code into the host image according to the parity of the reconstruction levels of the BTC quantizer. In 2011, Yang and Lu [22] proposed an image authentication method using BTC. Their authentication code is embedded into the block according to the odevity of the number of ‘1’s in the bitmap. If the authentication code bit is ‘1’, the number of ‘1’s in the bitmap is made odd by changing, at most, the three-pixel value of the block. If the authentication code bit is ‘0’, the number of ‘0’s in the bitmap is modified following a similar rule. In the tampering detection phase, the authentication code can be extracted according to the odevity of the number of ‘1’s in each block. In 2013, Hu et al. [23] proposed a fragile watermarking method based on AMBTC. In their approach, the authentication code is derived using a pseudo-random generator. For each block, the corresponding bitmap is further divided into k sub-bitmaps with the same size. Then, based on the idea of bit-flipping in [35], each sub-bitmap is used to carry a one-bit authentication code by adjusting the parity of the number of ‘1’s to make it equal to that of the one-bit authentication code. Moreover, to achieve the better image quality, the most suitable flipping bit was determined using the least distortion criterion [24]. Besides, two quantization levels are recomputed to further improve the quality of the compressed image block. The renewed AMBTC compression codes are further compressed using the linear prediction technique and the Huffman coding technique to cut down the storage cost of the AMBTC compression codes. Among these methods [22,23], weaknesses have been noted, in that changing the bitmap may further distort reconstructed image quality.
To solve this problem, Hu et al. [25] in 2013 proposed another image authentication scheme for BTC-compressed images. For each image block, the AC was thus embedded into quantization levels by adjusting the k-bit parity value of their difference to be the same as the k-bit AC. In 2014, Nguyen et al. [26] discovered the mean square error provided by scheme [25] was increased because of adjustment of the quantization levels. Thus, a reference table was designed to carry the AC to achieve a better image quality. The PSNR provided by their scheme is around 32.43 dB. In the same year, Lin et al. [27] adopted the odevity of the bitmap of AMBTC compression codes to derive the authentication code and then inserted the authentication code into the quantization levels. To enhance the security of the authentication code, the embedding position of the authentication code would be selected with the aid of a pseudo-random sequence. For tampering detection, a two-hierarchy tampering detection strategy is employed to increase performance. In the end, 15 of 16 tampered blocks can be successfully detected when each block carries a four-bit authentication code. Compared to Hu et al. [23], the method proposed by Lin et al. [27] has better visual quality and good detection accuracy. In 2016, Li et al. [28] proposed a novel image authentication scheme to verify the integrity of the AMBTC-compressed image. For each block, the authentication code is inserted into the quantization levels according to the determined reference matrix. The length of the to-be-inserted authentication code can be flexibly decided as the user requires. In this way, their true detection ratio is close to 93.75%, while the authentication code is designed as four bits. For these schemes [25,26,27,28], there is room for improvement in detecting the compression codes’ attack and collage attack.
To achieve this goal, in 2017, Lin et al. [29] proposed a hybrid image authentication method to protect the integrity of the AMBTC-compressed image. To begin with, they considered the bitmap of the smooth area rather than the complex area as more suitable for parity-check coding [36]. Hence, their scheme first classified the image’s blocks into two groups: Smooth and complex. For the smooth group, they forced the parity of the sub-bitmap to match that of the to-be-embedded authentication bit using the bit-flipping technique. For the complex block, on the other hand, the authentication code is embedded into the quantization levels according to a reference table. The different traversal sequence, decided by the number of ‘1’s in a bitmap, is chosen as the hiding sequence to carry the authentication code. In the tampering detection phase, a hybrid strategy is used to ensure superior localization accuracy along with better visual image quality. Experimental results confirm Lin et al.’s scheme outperforms previous schemes on the image quality of watermarked images and tamper detection. However, it is a little regrettable that the scheme [29] did not completely solve the compression codes’ attack. Hence, in 2018, Hong et al. [30] proposed an efficient image authentication method for AMBTC-compressed images using adaptive pixel pair matching. In their scheme, image blocks are classified into edge and non-edge blocks using a predetermined threshold. For each block, the bitmap and location information are inputted into a hashing function to generate the authentication code. The length of the authentication code ranges from one to four bits and can be flexibly determined, according to the type of image block. Then, the authentication code is embedded into the quantization levels using an adaptive reference table. Their scheme significantly reduces image distortion caused by embedding the authentication code and provides a lower false detection rate, averaging at 0.17%. However, their embedding strategy could break the natural relationship between high and low quantization levels; thus, it can only confirm the authenticity of AMBTC compression codes rather than being effective for AMBTC-compressed images. Additionally, their embedding strategy does not always guarantee the minimum distortion for an embedded edge block because a predetermined distance between two quantization levels must be maintained after authentication code embedding.
The same year, Hong et al. [31] proposed two image authentication schemes, i.e., LSBP and MSBP, for tampering detection for AMBTC compression codes. For each block, their schemes can embed an (a + b)-bit authentication code generated from the bitmap and quantization levels’ MSBs. LSBP is a strategy that embeds the a-bit authentication code into a high quantization level and the b-bit authentication code into a low quantization level using LSBs replacement. Due to the rough embedding strategy, MSBP is suggested to minimize distortion using an MSBs perturbation technique. Their schemes have the ability to achieve a tampering detection rate of more than 93.75%. However, in a few cases, their scheme fails to authenticate the watermarked image due to having broken the natural correlation between quantization levels.
Table 1 gives summaries of those authentication schemes [23,25,26,27,28,29,30,31]. In short, some of them [26,28,29,30] need to store a reference matrix during the AC embedding and authentication phase, and some schemes [23,25,26,27,28,29] have a limitation against the compression codes’ attack or collage attack. Also, most existing methods [23,26,27,28,29,30] have the weakness that the upper bound of their first hierarchical tampering detection accuracy is around 93.75%. Hence, most of them employ a second hierarchical tampering detection strategy, such as neighborhood elimination, to improve the tampering detection rate. To overcome those problems, this paper proposes a novel image authentication scheme that protects the integrity of both AMBTC compression codes and AMBTC-compressed images. The proposed scheme does not need a reference matrix during AC embedding and extraction and can resist both the compression codes’ attack and collage attack. Our approach achieves a higher tampering detection rate in the first hierarchical tampering detection round without a remediation mechanism and sustains acceptable visual quality.
The rest of this paper is organized as follows: We briefly review related works in Section 2, including AMBTC compression technology and matrix encoding; in Section 3, we describe the proposed scheme in detail; in Section 4, we perform a series of experiments to show the performance of our approach; finally, we provide conclusions in Section 5.

2. Related Works

In this section, we first introduce the AMBTC compression technique for an image in Section 2.1 and then look at the matrix encoding for data hiding in Section 2.2.

2.1. AMBTC Compression

In some cases, to increase the speed of transmission, users have to reduce the size of the digital image in advance with compression techniques, whether lossy or lossless. AMBTC is a widely used compression technology due to its simple computation [33]. Meanwhile, AMBTC is a variation of BTC [34] with better reconstructed image quality. Assume there is a to-be-compressed image, I, of X × Y pixels. The image, I, is thus divided into x · y non-overlapping blocks, with the size of each block being w × w pixels. In general, w is set to 4 in both BTC and AMBTC. Assume p(1, 1), p(1, 2), …, p(1, w); p(2, 1), p(2, 2), …, p(2, w); …; p(w, 1), p(w, 2), …, p(w, w) are the pixel values of each block. The detailed process of AMBTC compression is described as follows. First, the average, μ , of those pixels’ values in a block is calculated by:
μ   = 1 w w r = 1 w c = 1 w p ( r , c ) ,
where p(r, c) is the pixel value of a block in the to-be-compressed image, I.
According to the average value, μ , the pixels in a block can be partitioned into two subgroups according to the following rules:
{ p ( r , c ) G S 0 ,   if   p ( r , c ) < μ , p ( r , c ) G S 1 ,   if   p ( r , c ) μ ,
where 1 r , c w , GS0 is a subgroup that contains all pixels whose values are lower than the average value, μ , and GS1 is a subgroup that contains the pixels not included in GS0.
Later, the average value for each subgroup is calculated as follows:
l   = 1 k 0 p ( r , c ) G S 0 p ( r , c ) ,
h   = 1 k 1 p ( r , c ) G S 1 p ( r , c ) ,
where k0, k1 are the numbers of pixels in the subgroups, GS0, GS1, respectively, and k0 + k1 = k, k = w · w. Here, h is the high quantization level and l is the low quantization level. A bitmap (bm) for the current block is generated based on the following rules: (1) If the pixel belongs to the subgroup, GS0, its corresponding position in the bitmap is marked ‘0’; (2) if the pixel belongs to the subgroup, GS1, its corresponding position in the bitmap is marked ‘1’. The generation rule for the bitmap is described as follows:
b m ( r , c ) = { 0 ,   p ( r , c ) G S 0 1 ,   p ( r , c ) G S 1 ,   for   1 r , c w .
In this way, the AMTBC compression code for one block is derived in the form of a trio (h, l, bm). On the receiving side, the decoding process is quite simple. A reconstructed block can be derived based on the following rules:
p ( r , c ) = { l ,   if   b m ( r , c ) = 0 h ,   i f   b m ( r , c ) = 1 ,   for   1 r , c w ,
where p ( r , c ) is the pixel value of the reconstructed image. Once all blocks have been processed by Equation (6), the reconstructed image is obtained.

2.2. The Matrix Encoding

The (7, 4) Hamming code [37,38] was invented in 1950 by Richard Hamming as a linear error-correction code. The basic idea of the (7, 4) Hamming code is that some attached information, i.e., three parity check bits, are added to the original four-bit data. As a result, the recipient can detect and correct a single-bit error with the help of the parity check matrix, H, as shown in Equation (7). The result of the equation ( H × R C W T ) T indicates where the error bit occurs, with RCW representing the received codeword. Assume a codeword that meets the verification rules is CW = (1101001), and the received codeword is RCW = (1100001), and the syndrome vector, zT = (100)T, is equal to the fourth column of the parity check matrix, H. This means that a single-bit error is detected and the error bit in this RCW is in the fourth position.
z = ( H × R C W T ) T =   ( [ 0 0 0 1 1 1 1 0 1 1 0 0 1 1 1 0 1 0 1 0 1 ] × [ 1 1 0 0 0 0 1 ] ) T =   ( 100 ) .
Based on the (7, 4) Hamming code, Ron Crandall proposed an efficient embedding method known as matrix encoding [39]. In matrix encoding, for a (1, n, k) code, the n modifiable bit-places are used to carry the k-bit secret message by flipping at most one modifiable place, where n = 2k − 1. In this paper, we pay more attention to the (1, 7, 3) code.
First, a coset of the (7, 4) Hamming code with a parity check matrix, H, is constructed, as shown in Table 2. To show the embedding process intuitively, an example is given as follows.
Let us assume the to-be-embedded message is S = (s1, s2, s3) and the cover vector is CV = (c1, c2, c3, c4, c5, c6, c7). The details of the embedding process are as follows.
Step 1:
Compute M = ( H × C V T ) T to derive vector M.
Step 2:
Calculate the syndrome vector, z = M S .
Step 3:
Search for the same syndrome value as z in Table 2, then the gth column can be located, where 0 g 7 . The corresponding identifier (ID) is also g, which is the to-be-flipped bit-location later in this paper. At the same time, the corresponding coset leader vector is mapped as eg.
Step 4:
Change the gth bit of the cover vector CV by C V = C V e g . Note that if the syndrome value, z = (000) or g = 0, then there is nothing to be changed; that is, CV′ = CV.
Finally, the embedding process ends and CV′ carries the three-bit secret message. The decoding process is simple, using S = ( H × ( C V ) T ) T , where S′ is the extracted message and is the same as the secret message S, as long as no error occurred.
For example, assume S = (101) and CV = (1101001). The computed M is (000) and the syndrome z is (101). By searching Table 2, the fifth column is located, ID = 5 is found, and its corresponding coset leader, e5 = (0000100), is determined. Finally, the embedding process is carried out and the cover vector, CV, is changed to CV′ = (1101101). For the recipient, the secret, S′, can be extracted by S = ( H × ( C V ) T ) T = ( 101 ) . That is to say, the seven-bit cover vector can carry the three-bit message by changing at most one bit.

3. Proposed Scheme

To increase the tampering localization accuracy after the first hierarchical tampering detection, the bitmap carries more authentication code for each block using the matrix encoding scheme. Meanwhile, to overcome the distortion caused by changing the bitmap, the corresponding to-be-flipped bit-location information, G, is recorded instead of flipping this bit of the bitmap directly. Then, this bit-location information is embedded into the quantization levels based on adjusted quantization level matching. Finally, a flowchart of the authentication code generation and embedding is shown in Figure 1. Besides, to better present the proposed scheme, the main symbols used in this paper and their definitions are listed in Table 3.

3.1. AMBTC Compression and Preprocessing Phase

In this paper, the original image, I, is divided into non-overlapping blocks, and then the AMBTC compression technique as mentioned in Section 2.1 is performed for image block compression. As a result, AMBTC compression codes are derived and denoted as (H, L, BM), where H, L, and BM represent the sets of high quantization level, low quantization level, and bitmap, respectively. For convenience, let us assume (h, l, bm) is a triple of AMBTC compression codes for one block. The preprocessing of the AMBTC compression code for a block is done as follows:
{ l ^ = l ,   h ^ = h + 1 ,   b m ^ = b m   &   b m ( u , v ) = 0 , if   l = h = 0 , l ^ = l 1 ,   h ^ = h ,   b m ^ = b m   &   b m ( u , v ) = 0 , if   0 <   l = h 255 , l ^ = l ,   h ^ = h ,   b m ^ = b m , if   l h ,
where u and v are constants, and h ^ , l ^ , and b m ^ are the high quantization level, low quantization level, and bitmap of a preprocessed AMBTC compression code, respectively. After all blocks have been preprocessed in the same way, the preprocessed AMBTC compression codes ( H ^ , L ^ , B M ^ ) were obtained. Note that the bm(u, v) should not be used in the embedding procedure. In our experiments, (u, v) is set to (3, 1), based on experimental results.
We preprocess to check whether the h is equal to l. If it is, the bits in the bm are all equal to ‘1’ and the preprocessing should thus be conducted; otherwise, nothing should be done. Preprocessing ensures the recipient can obtain the same AMBTC compression codes from the reconstructed image, as long as no malicious attack occurs. Two examples of preprocessing are the red dotted squares shown in Figure 2. In Figure 2a, since h is not equal to l, the AMBTC compression code remains the same ( h ^ ,   l ^ ,   b m ^ ) = ( h , l , b m ) . Meanwhile, in Figure 2b, since h is equal to l, the AMBTC compression code is preprocessed as ( h ^ ,   l ^ ,   b m ^ ) = ( h , l 1 , b m   &   b m ( 3 , 1 ) =   0 ) .

3.2. Authentication Code Generation Phase

After the processed AMBTC compression code is generated, for each block, our approach generates a six-bit authentication code by feeding the block’s b m ^ and location information into a hash function. This six-bit authentication code is further separated into two three-bit sub-codes, which are embedded into the bitmap using matrix encoding. Let us assume that the binary form of a six-bit authentication code is a c = ( a c 1 , a c 2 , a c 3 , a c 4 , a c 5 , a c 6 ) ; the first three-bit sub-code is then defined as a c 1 = ( a c 1 1 , a c 2 1 , a c 3 1 ) = ( a c 1 , a c 2 , a c 3 ) and the second three-bit sub-code as a c 2 = ( a c 1 2 , a c 2 2 , a c 3 2 ) = ( a c 4 , a c 5 , a c 6 ) .

3.3. Embedding Phase

The flowchart of the authentication code embedding phase is shown in Figure 1. First, the authentication code is embedded into the bitmap. In fact, we only record the to-be-flipped bit-location information. No modification has been done in bm, as will be described in Section 3.3.1. Second, the to-be-flipped bit-location information is inserted into the two quantization levels, as will be described in Section 3.3.2.

3.3.1. The Matrix Encoding Based Data Hiding

After authentication code generation and AMBTC compression codes’ preprocessing, the authentication code will be embedded into the bitmap for each block. The algorithm of the embedding process is described as follows.
Input: Original image, I.
Output: To-be-flipped bit-location information, G.
Step 1.
Divide the original image, I, into non-overlapping blocks by a size of 4 × 4 pixels.
Step 2.
Generate the AMBTC compression codes (H, L, BM) for the image, I, as explained in Section 2.1. For each block, assume its preprocessed AMBTC compression code is ( h ^ ,   l ^ ,   b m ^ ) .
Step 3.
Generate the authentication code, AC, as explained in Section 3.2. For each block, assume the first three-bit sub-code is a c 1 = ( a c 1 1 , a c 2 1 , a c 3 1 ) and the second three-bit sub-code is a c 2 = ( a c 1 2 , a c 2 2 , a c 3 2 ) .
Step 4.
Extract the first seven bits of bm as the first cover vector, CV1 = ( c v 1 1 , c v 2 1 , c v 3 1 , c v 4 1 , c v 5 1 , c v 6 1 , c v 7 1 ) = (bm(1, 1), bm(1, 2), bm(1, 3), bm(1, 4), bm(2, 1), bm(2, 2), bm(2, 3)). Extract the last seven bits of bm as the second cover vector, CV2 = ( c v 1 2 , c v 2 2 , c v 3 2 , c v 4 2 , c v 5 2 , c v 6 2 , c v 7 2 ) = (bm(3, 2), bm(3, 3), bm(3, 4), bm(4, 1), bm(4, 2), bm(4, 3), bm(4, 4)).
Step 5.
Perform matrix encoding, as explained in Section 2.2, to embed the first three-bit sub-code, ac1, into the first cover vector, CV1, then derive the to-be-flipped bit-location, g1. The second three-bit sub-code, ac2, is embedded into the second cover vector, CV2, and then used to derive the to-be-flipped bit-location, g2. Note that we only record the to-be-flipped bit-location information but nothing is modified for the bm. Hence, for each block, two-tuple location information (g1, g2) can be derived.
Step 6.
Perform Steps 2 to 5 until all blocks have been processed.
Step 7.
Output all location information (g1, g2) for each block to the to-be-flipped bit-location information, G.
Step 8.
End.
After matrix encoding is completed, the to-be-flipped bit-location information, G, is obtained. We provide two examples to demonstrate the generation of the to-be-flipped bit-location information, as shown in Figure 2. In Figure 2a, the first seven bits of bm are recombined as the first cover vector, CV1, shown in purple. The last seven green bits comprise the second cover vector, CV2. Later, matrix encoding is conducted, as described in Section 2.2, and then the two-tuple location information (g1 = 3, g2 = 4) will be derived and used as the to-be-hidden message in the next section. In this case, the AMBTC compression code is not changed. Similarly, Figure 2b presents a special case, i.e., h is equal to l and all bits in bm are 1. Thus, the preprocessing of the AMBTC compression code should be done, as described in Section 3.1; i.e., l is decreased by 1 and the bm(3,1) is set to 0. In this case, l and bm are slightly modified. Also, two-tuple location information (g1 = 2, g2 = 5) will be derived and used as the to-be-hidden message in the following phase. The yellow grid represents the chosen bm(3,1), as described in Section 3.1.

3.3.2. Adjusted Quantization Levels Matching Based Data Hiding

After the matrix encoding procedure, the two-tuple to-be-flipped bit-location information, G, is individually inserted into two quantization levels. The algorithm of the adjusted quantization level matching-based data hiding is described as follows.
Input: Preprocessed AMBTC compression codes ( H ^ , L ^ , B M ^ ) , to-be-flipped bit-location information, G.
Output: Watermarked image, WI.
Step 1.
Get a triple ( h ^ ,   l ^ ,   b m ^ ) for one block from preprocessed AMBTC compression codes ( H ^ , L ^ , B M ^ ) .
Step 2.
Get the corresponding to-be-flipped bit-location information (g1, g2) for this block from G.
Step 3.
Calculate the factors for h ^ and l ^ for the current block by:
{ f h = h ^ 2 3 , f l = l ^ 2 3 ,
where fh and fl represent the factors of h ^ and l ^ , respectively.
Step 4.
Calculate the remaining values for h ^ and l ^ for the current block by:
{ r v h = h ^   mod   2 3 , r v l = l ^   mod   2 3 ,
where rvh and rvl represent the remainder values of h ^ and l ^ , respectively.
Step 5.
Perform adjusted quantization level matching-based data hiding. If the remainder, rvh, is equal to g1, the matching work of h ^ is done; otherwise, the candidates at the quantization level, h ^ , should be adjusted by:
{ h 1 = f h 2 3 + g 1 , h 2 = { h 1 + 2 3 , if   h 1 < h ^ , h 1 2 3 , if   h 1 > h ^ , h 1 , if   h 1 = h ^ ,
where h1 and h2 are the candidates at the quantization level, h ^ . Here, if h2 is lower than zero or higher than 255, h2 must be set to h1. Similarly, if the remainder, rvl, is equal to g2, the matching work of l ^ is done; otherwise, the candidates at the quantization level, l ^ , should be adjusted by:
{ l 1 = f l 2 3 + g 2 , l 2 = { l 1 + 2 3 , if   l 1 < l ^ , l 1 2 3 , if   l 1 > l ^ , l 1 , if   l 1 = l ^ ,
where l1 and l2 are the candidates at quantization level l ^ . l2 must be set to l1 if l2 is lower than zero or higher than 255.
Step 6.
Let hcf = ha and lcf = lb be the final, selected solution under the constraint of the least distortion, dist(a,b), which can be calculated by:
d i s t ( a , b ) = r = 1 4 c = 1 4 { ( p ( r , c ) h a ) 2   if   b m ( r , c ) = 1 , ( p ( r , c ) l b ) 2    if   b m ( r , c ) = 0 ,
where a , b [ 1 , 2 ] , h a [ h 1 , h 2 ] , l b [ l 1 , l 2 ] . Besides, in a few cases, this situation may happen, that is, hcf will be equal to lcf, then hcf or lcf will be forced to be justified once again by the following rule:
{ l c f = l c f 2 3 ,     if   l c f > 247 , h c f = h c f + 2 3 ,   otherwise .
Step 7.
Perform Steps 1 to 6 until all blocks have been processed.
Step 8.
Output the watermarked AMBTC compression code for each block, and the watermarked image, WI, is achieved.
Step 9.
End.
An example is given to show the detailed processing of the adjusted quantization level matching-based data hiding in Figure 3. Here, for convenience, we assume dist(1,1) is the least distortion after calculation using Equation (13) in this example.

3.4. Tampering Detection Phase

Once the recipient receives the watermarked image, WI, or the watermarked AMBTC compression codes, the precise tampering detection can be done in respect to whether the tampering occurred or not. Figure 4 depicts the flowchart of tampering detection. First, the bit-location information is extracted from the AMBTC compression codes. Then, the authentication code is calculated and reconstructed. Finally, the extracted and recalculated authentication code are compared to determine whether each block has been tampered with.

3.4.1. Extraction of Bit-Location Information

The algorithm for bit-location information extraction is described as follows.
Input: Watermarked image, WI.
Output: Bit-location information, G′.
Step 1.
Divide the watermarked image, WI, into non-overlapping blocks by a size of 4 × 4 pixels.
Step 2.
Perform the AMBTC compression technique for one block to derive the corresponding AMBTC compression code (h’, l’, bm’).
Step 3.
Extract the bit-location information ( g 1 , g 2 ) for this block by the following equation:
{ g 1 = h mod 2 3 , g 2 = l mod 2 3 ,
Step 4.
Perform Steps 2 and 3 until all blocks have been processed.
Step 5.
Output all location information ( g 1 , g 2 ) for each block to provide the bit-location information, G′.
Step 6.
End.
An example of bit-location information extraction is given in Figure 5a.

3.4.2. Extraction of the Authentication Code

The algorithm of authentication code extraction is described as follows.
Input: AMBTC compression codes (H’, L’, BM’), bit-location information, G′.
Output: Extracted authentication code, EAC.
Step 1.
Get a triple (h’, l’, bm’) for one block from AMBTC compression codes (H’, L’, BM’).
Step 2.
Get a tuple bit-location information ( g 1 , g 2 ) for the corresponding block from G′.
Step 3.
Recombine the first seven bits of bm’ as the first cover vector, C V ¯ 1 = ( c v 1 1 , c v 2 1 , c v 3 1 , c v 4 1 , c v 5 1 , c v 6 1 , c v 7 1 ) . Recombine the last seven bits of bm’ as the second cover vector, C V ¯ 2 = ( c v 1 2 , c v 2 2 , c v 3 2 , c v 4 2 , c v 5 2 , c v 6 2 , c v 7 2 ) .
Step 4.
Flip the g 1 th bit for the first cover vector, C V ¯ 1 , and denoted as C V 1 , then flip the g 2 th bit for the first cover vector, C V ¯ 2 , and denoted as C V 2 . Note that if g 1 or g 2 is equal to zero, the corresponding flipping operation is skipped. In Figure 5b, the red digit represents the flipped bit-location.
Step 5.
Extract the authentication code. Two three-bit sub-codes ( a c 1 , a c 2 ) can be computed by:
{ a c 1 = ( H × ( C V 1 ) T ) T , a c 2 = ( H × ( C V 2 ) T ) T .
Then, the six-bit authentication code, a c , can be derived by:
a c = a c 1 2 3 + a c 2 .
Step 6.
Perform Steps 1 to 5 until all blocks have been processed.
Step 7.
Output the authentication code, a c , for each block to provide the extracted authentication code, EAC.
Step 8.
End.
Figure 5b shows an example of authentication code extraction.

3.4.3. Tampering Detection

The algorithm of the tampering detection is described as follows.
Input: Extracted authentication code, EAC.
Output: Tampered map, TM.
Step 1.
Generate the authentication code, as mentioned in Section 3.2, and denote it as RAC.
Step 2.
Get an authentication code for one block from RAC and denote it as Rac.
Step 3.
Get an authentication code for the corresponding block from EAC and denote it as Eac.
Step 4.
Mark the tampered map, TM, according to the comparison results of Rac and Eac. If they are equal, the corresponding position of TM is marked as ‘0’, which means the current block is valid; otherwise, it is marked as ‘1’, which indicates the current block is invalid.
Step 5.
Perform Steps 2 to 4 until all blocks have been processed.
Step 6.
Output the tampered map, TM.
Step 7.
End.
Without loss of generality, a second hierarchical tampering detection algorithm [29,30] is also provided in our experiments. This improves the tampering detection rate, even if excellent detection performance is already offered by the first hierarchical tampering detection algorithm.

4. Experimental Results

In this section, a series of experiments and analyses are performed to demonstrate the performance of the proposed method. All experiments were implemented in Matlab R2017a on a PC with Intel® Core (TM) i7-3770 CPU @3.4 GHz, 8 GB RAM (Intel Corporation, Santa Clara, CA, USA). Nine classic grayscale images with the size of 512 × 512 served as test images, as shown in Figure 6. Several attacks were employed to test the performance of our proposed scheme on tampering detection, including cropping attack, constant average attack, collage attack, and AMBTC compression codes’ attack. All test images were compressed using the AMBTC compression technique with the size of 4 × 4 pixels.

4.1. Statistical Metrics

The following statistical metrics were utilized to demonstrate the superior performance of our approach.
(a) Peak signal-to-noise ratio (PSNR) [14]: Measures the difference between the watermarked image and the original image:
P S N R = 10 log 10 ( 255 2 1 X Y i = 1 X j = 1 Y ( p w i ( i , j ) p o i ( i , j ) ) 2 ) ,
where X × Y is the size of an image; p w i ( i , j ) represents the pixel value of the watermarked image, and p o i ( i , j ) represents the pixel value of the original image.
(b) Tampering detection rate (TDR) [14]: Measures the percentage of tampered pixels detected in a tampered area:
T D R = No .   of   detected   tampered   pixels All   pixels   in   tampered   region .
(c) False positive rate (FPR) [14]: Measures the percentage of non-tampered pixels misjudged as tampered, among all tampered pixels:
F P R = No .   of   false   misjudged   pixels All   tampered   pixels .
(d) False negative rate (FNR) [14]: Measures the percentage of tampered pixels misjudged as non-tampered, among all non-tampered pixels:
F N R = No .   of   false   misjudged   pixels All   non - tampered   pixels .

4.2. Tampering Detection Analyses

In our experiments, we performed more than 14 kinds of attacks to show the stable and reliable localization ability and superior performance of the first hierarchical tampering detection algorithm. The details are as follows.

4.2.1. Cropping Attack

We used three grayscale images, Lena, Elaine, and woman, to simulate the cropping attack. Their watermarked images are shown in Figure 7a–c, with PSNRs of 31.99, 32.41, and 35.03 dB, respectively. The tampered Lena image is shown in Figure 7d, with some inside blocks cropped with a rectangle. The corresponding tampering detection result using the first hierarchical tampering detection method is shown in Figure 7g, with a TDR of 98.75%. The tampered Elaine image is attacked by outside cropping within the larger area, as shown in Figure 7e. The corresponding tampering detection result delivered by the first hierarchical tampering detection algorithm is shown in Figure 7h, with a TDR of 98.60%. Finally, we employed an inside cropping attack with an irregular shape to replace some blocks of the watermarked woman image, as shown in Figure 7f. Certainly, the proposed scheme achieves a high tampering detection rate, with a TDR of 98.99%. Thus, our approach achieves superior detection and localization to both the inside cropping attack and the outside cropping attack.
Furthermore, the tampering detection performance for the cropping attack is demonstrated in Table 4. As we can see, after the first hierarchical tampering detection algorithm, the number of tampered blocks for the tampered Lena, Elaine, and woman images are 949, 5620, and 293, respectively. Our approach achieves a high TDR, with an average of 98.78%, and a low FPR and FNR, with averages of 0 and 0.3356, respectively. Additionally, a second hierarchical tampering detection strategy was used in this paper, and the corresponding detection performance is shown in Table 4. Here, the TDR is close to 100% and the FNR and FPR are close or equal to 0.

4.2.2. Constant Average Attack

Two watermarked images using our proposed scheme, Zelda and baboon, are shown in Figure 8a,d, with PSNRs of 35.07 and 27.78 dB, respectively. The constant average attack is an attack that replaces all pixels of one block with the average value of the current block. Figure 8b shows the tampered Zelda image. Within a 2 × 2 block, all pixels are modified by the mean value. As we can see, it is difficult to identify the change visually. The corresponding tampering detection result using the first hierarchical tampering detection method is shown in Figure 8c, with a TDR of 96.42%. Figure 8e shows the tampered baboon image under the constant average attack. Within a 4 × 4 block, all pixels are replaced by the mean value. The corresponding tampering detection result from the first hierarchical tampering detection algorithm is shown in Figure 8f, with a TDR of 99.02%.
Meanwhile, Table 5 shows the tampering detection performance of the constant average attack. As we can see, after the first round of hierarchical tampering detection, the TDR of the four experiments is higher than 96.42% and there is low FNR and FPR. The second hierarchical tampering detection strategy was also employed, and the corresponding detection performance is rather good. For both, the TDR is close to 100% and the FPR and FNR are close to 0.

4.2.3. Collage Attack

In this section, an image is tampered with by copying image blocks from other watermarked images and pasting them into arbitrary positions in the watermarked image; this is called a collage attack. In Figure 9, we can see the watermarked images of lake, peppers, boat, and couple, with PSNRs of 29.88, 32.15, 30.89, and 30.38 dB, respectively. The first example of collage attack, shown in Figure 9c, is generated by copying the vegetables from Figure 9b into Figure 9a while preserving their relative spatial locations. After the first hierarchical tampering detection, the corresponding tampering detection result is shown in Figure 9d, with a TDR of 98.45%. Similarly, we copied some blocks from the watermarked couple image, shown in Figure 9f, into the watermarked boat image, shown in Figure 9e on the bottom left. The tampered boat image is presented in Figure 9g. Verification was performed using our tampering detection approach, with a TDR of 98.59%, as shown in Figure 9h.
Table 6 lists the detailed tampering detection performance of the proposed scheme. The tampering detection rate reaches 98%, with an FPR of 0 and a lower FNR. Furthermore, a two-hierarchy tampering detection strategy was also employed on this kind of attack, resulting in superior tampering detection, as shown in the last three columns of Table 6.

4.2.4. AMBTC Compression Codes’ Attacks

In this section, kinds of experiments are performed to test the tampering detection performance of the AMBTC compression codes’ attack. We applied these attacks to the original 512 × 512 Lena image.
(a) Attack the quantization levels
We first tampered with either the high quantization level or the low quantization level of the 120 × 120 AMBTC compression codes, illustrated in Figure 10a. The modification is so natural that it is impossible to identify visually. Figure 10e shows the detection result obtained after the first hierarchical tampering detection, with a TDR of 100%. The corresponding experimental results appear in Table 7.
(b) Attack the quantization levels with a flower
Secondly, based on the experiment of attacking the quantization levels, at the same time, we tried to copy and paste a flower onto Lena’s shoulder, as shown in Figure 10b. It is not easy to detect the attack under this scenario. The corresponding tampering detection result using the first hierarchical tampering detection method is shown in Figure 10f, with a TDR of 99.42%. Other statistical parameters are listed in the fourth row of Table 7.
(c) Attack the bitmap
We also simply tampered with the bitmap of the 120 × 80 AMBTC compression codes, shown in Figure 10c. Again, it is hard to notice any change to the Lena image. The tampered area is around Lena’s face, and Figure 10g shows the tampering detection result after the first hierarchical tampering detection, with a TDR of 100%. Some experimental results are listed in the fifth row of Table 7.
(d) Attack the bitmap and copy/paste a flower
We now tampered with the Lena image by modifying the bitmap and adding a flower near her shoulder, as illustrated in Figure 10d. The tampering detection result delivered by our approach is shown in Figure 10h, with a TDR of 99.22%. In Table 7, the sixth row shows the detailed detection results, with lower FPR and FNR.
In summary, we implemented multiple experiments to test the performance of our proposed tampering detection scheme, including the cropping attack, constant average attack, collage attack, and AMBTC compression codes’ attacks. After the first hierarchical tampering detection, our proposed scheme can offer a high TDR along with low FPR and FNR for all kinds of attacks.

4.3. Performance Comparisons

Table 8 compares the PSNRs of the reconstructed images by using the original AMBTC compression codes and watermarked AMBTC compression codes generated through our proposed scheme. The watermarked images have a few more distortions than the image reconstructed using the original AMBTC compression codes. The average PSNR of the watermarked image using our approach is around 31.66 dB; in other words, we sustained acceptable visual quality while achieving highly accurate tampering detection.
Table 9 compares the tampering detection performance among three existing schemes and our proposed scheme. The upper bounds of the number of authentication bits in Lin et al.’s scheme [29], Hong et al.’s scheme [30], and the proposed scheme are four, four, and six, respectively. Thus, the proposed scheme obtains higher tampering detection accuracy than the other two with the assistance of one six-bit authentication code per block. The experimental results provide the expected effect; that is, the average TDR of our proposed scheme is about 98.55% in the first hierarchical tampering detection procedure, which is about 4.8% higher than those of Lin et al.’s scheme [29] and Hong et al.’s scheme [30]. In other words, our approach can offer a more stable and reliable tampering detection performance. In Lin et al.’s scheme [29] and Hong et al.’s scheme [30], the stego-images’ quality with the four-bit authentication code has average PSNRs of 33.07 and 32.33 dB, respectively. Also, we can observe that Hong et al.’s scheme [31] proposes two embedding strategies that can embed an eight-bit authentication code into each block, resulting in a TDR of 99.61% and average PSNRs of 28.92 and 29.84 dB. Meanwhile, with the same size of the authentication code, i.e., six bits, our proposed scheme and the Hong et al. scheme [31] have the same effect with respect to the TDR. The average PSNR of our approach is 0.39 dB higher than that of the LSBP scheme and 0.05 dB lower than that of the MSBP scheme. Hong et al.’s scheme tries at least six possible combinations to find the minimal distortion during authentication code embedding with MSBP. Therefore, it can be concluded they maintain image quality at the cost of execution efficiency. Also, a large proportion of image authentication methods employ multi-hierarchical tampering detection strategies as a remedial measure to improve their TDR. In Table 9, we report the detection performance offered by Lin et al.’s scheme [29], Hong et al.’s scheme [30,31], and the proposed scheme. The four schemes had very similar tampering detection rates after the second hierarchical remediation measure. However, our proposed scheme outperforms the others when considering tampering detection performance and the image quality of the watermarked images from the first hierarchical tampering detection.
Table 10 summarizes comparisons between the proposed scheme and other work [29,30,31]. It can be observed that Lin et al.’s scheme generates an authentication code by using a pseudo-random generator, while Hong et al.’s scheme [30] and the proposed scheme do so by hashing the bitmap and location information, and Hong et al.’s scheme [31] generates the authentication by hashing the bitmap and quantization levels’ MSBs. Lin et al.’s scheme [29] can resist the cropping attack, constant attack, and collage attack, but is weak against tampering with the bitmap of the complex blocks because it only embeds the authentication code into the quantization levels. The two schemes proposed by Hong et al. [30,31] are sensitive to AMBTC compression codes’ attacks since they embed the authentication code generated to refer to the bitmap into the quantization levels. However, in some cases, the natural relationship between two quantization levels is broken for some blocks, making it only possible to verify the authenticity of the AMBTC compression codes and not that of the AMBTC-compressed image. Hence, in their schemes, it seems likely that only professional technicians will be able to implement the cropping attack, constant average attack, or collage attack. Also, Hong et al.’s scheme [31] is poor against the collage attack. In our approach, we embed the authentication code in the bitmap in a virtual manner and insert the bit-location information into the quantization levels later. This strategy maintains effective interlocking among the authentication code, the quantization levels, and the bitmap. If any slight modifications are encountered in the quantization levels or bitmap, the correlation between them will be broken. Thus, the proposed scheme can not only resist AMBTC compression codes’ attacks but also detect the cropping attack, constant average attack, and collage attack. Undoubtedly, the experimental results show that our approach provides more stable and reliable tampering detection performance by simply conducting first hierarchical tampering detection and also sustains acceptable visual quality.
Table 11 summarizes comparisons among the proposed scheme and the authentication methods for compressed images using other compression techniques. Herein, the smaller the detectable block size is, the precision the detecting unit is, and the larger the size of AC is, the more tampering detection accuracy it has. We can observe that the JPEG-based authentication schemes [17,18] embed the AC in the frequency domain. Although their schemes provide a better visual quality of the watermarked image, they have a weakness in their tampering detection accuracy because the size of the AC they embedded is one bit and three bits, respectively. It is also apparent that the schemes [18,19] provide a detectable block size of 8 × 8 pixels, which means that a lower precision of the detecting unit they are in. Besides, we also can find that our approach and scheme [19] work on the spatial domain. Our approach provides a better performance in tampering detection and image quality than that of the VQ-based scheme [19]. Moreover, the tamper detection performance of our proposed scheme is significantly better than the existing three schemes. Besides, we also can find that our approach and scheme [19] work on the spatial domain. Our approach provides a better performance in tampering detection and image quality than that of the VQ-based scheme [19].

5. Conclusions

This paper proposed a novel precise image authentication scheme to protect the integrity of AMBTC-compressed images. The authentication code is generated by hashing the processed bitmap and block’s location information. For each block, a six-bit authentication code is virtually inserted into the bitmap using matrix encoding. Instead of changing the bitmap, we only recorded the to-be-flipped bit-location information without modifying the bitmap in each block. This bit-location information is embedded into two quantization levels based on adjusted quantization levels matching. Experiments were performed to evaluate the performance of our approach. The results showed that our approach provides more stable and reliable tampering detection performance than previous work and sustains acceptable visual quality. In the future, we will try to use the bitmap adequately to provide strong tampering detection performance while improving image quality. Moreover, we will also pay more attention to the authentication schemes for compression codes.

Author Contributions

C.-C.C. conceived and designed the experiments; G.-D.S. performed the experiments and wrote the paper; and C.-C.L. analyzed the data.

Funding

This work was supported by the Education-Scientific research Project for Middle-aged and Young of Fujian Province under Grant No. JAT160574 and JT180621, and Ministry of Science and Technology: MOS 108-2410-H-126 -021.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Schneider, M.; Chang, S.F. A robust content based digital signature for image authentication. In Proceedings of the 3rd IEEE International Conference on Image Processing, Lausanne, Switzerland, 19 September 1996; pp. 227–230. [Google Scholar]
  2. Tabatabaei, S.A.H.; Ur-Rehman, O.; Zivic, N.; Ruland, C. Secure and robust two-phase image authentication. IEEE Trans. Multimed. 2015, 17, 945–956. [Google Scholar] [CrossRef]
  3. Yan, C.P.; Pun, C.M. Multi-scale difference map fusion for tamper localization using binary ranking hashing. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2144–2158. [Google Scholar] [CrossRef]
  4. Chen, Z.; Li, L.; Peng, H.; Liu, Y.; Yang, Y. A novel digital watermarking based on general non-negative matrix factorization. IEEE Trans. Multimed. 2018, 20, 1973–1986. [Google Scholar] [CrossRef]
  5. Walton, S. Image authentication for a slippery new age. Dr. Dobb's J. 1995, 20, 18–26. [Google Scholar]
  6. Wong, P.W.; Memon, N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 2001, 10, 1593–1601. [Google Scholar] [CrossRef] [PubMed]
  7. Haouzia, A.; Noumeir, R. Methods for image authentication: A survey. Multimed. Tools Appl. 2008, 39, 1–46. [Google Scholar] [CrossRef]
  8. Ozyurt, F.; Tuncer, T.; Avci, E. A novel probabilistic image authentication method based on universal hash function for RGB images. In Proceedings of the 2018 International Conference on Computing Sciences and Engineering (ICCSE), Kuwait City, Kuwait, 11–13 March 2018; pp. 1–6. [Google Scholar]
  9. Holliman, M.; Memon, N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 2000, 9, 432–441. [Google Scholar] [CrossRef] [PubMed]
  10. Zhang, X.; Wang, S.; Qian, Z.; Feng, G. Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 2011, 20, 485–495. [Google Scholar] [CrossRef] [PubMed]
  11. Zhang, X.; Xiao, Y.; Zhao, Z. Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed. Tools Appl. 2015, 74, 5767–5786. [Google Scholar] [CrossRef]
  12. Chang, C.C.; Lu, T.C.; Zhu, Z.H.; Tian, H. An effective authentication scheme using DCT for mobile devices. Symmetry 2018, 10, 13. [Google Scholar] [CrossRef]
  13. Dadkhah, S.; Manaf, A.A.; Hori, Y.; Hsssanien, A.E.; Sadeghi, S. An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process. Image Commun. 2014, 29, 1197–1210. [Google Scholar] [CrossRef]
  14. Shehab, A.; Elhoseny, M.; Muhammad, K.; Sangaiah, A.K.; Yang, P.; Huang, H.; Hou, G. Secure and robust fragile watermarking scheme for medical images. IEEE Access 2018, 6, 10269–10278. [Google Scholar] [CrossRef]
  15. Qin, C.; Ji, P.; Wang, J.; Chang, C.C. Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 2017, 76, 2267–2287. [Google Scholar] [CrossRef]
  16. Fan, M.; Wang, H. An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process. Image Commun. 2018, 66, 19–29. [Google Scholar] [CrossRef]
  17. Qi, X.; Xin, X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 2015, 30, 312–327. [Google Scholar] [CrossRef]
  18. Preda, R.O.; Vizireanu, D.N. Watermarking-based image authentication robust to JPEG compression. Electron. Lett. 2015, 51, 1873–1875. [Google Scholar] [CrossRef]
  19. Chuang, J.C.; Hu, Y.C. An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 2011, 22, 440–449. [Google Scholar] [CrossRef]
  20. Tu, S.F.; Hsu, C.S. A BTC-based watermarking scheme for digital images. Int. J. Inf. Secur. 2004, 15, 216–228. [Google Scholar] [CrossRef]
  21. Jiang, M.F.; Zhu, N.B. Image fragile watermarking algorithm based on BTC domain. Sci. Technol. Eng. 2009, 9, 717–720. [Google Scholar]
  22. Yang, C.N.; Lu, Z.M. A Blind image watermarking scheme utilizing BTC bitplanes. Int. J. Digi. Crime Forensics 2011, 3, 42–53. [Google Scholar] [CrossRef]
  23. Hu, Y.C.; Lo, C.C.; Chen, W.L. Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Imaging 2013, 22, 013012. [Google Scholar] [CrossRef]
  24. Yang, H.; Kot, A.C. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimed. 2007, 9, 475–486. [Google Scholar] [CrossRef]
  25. Hu, Y.C.; Lo, C.C.; Wu, C.M.; Chen, W.L.; Wen, C.H. Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification. Int. J. Secur. Its Appl. 2013, 7, 11–32. [Google Scholar]
  26. Nguyen, T.S.; Chang, C.C.; Chung, T.F.A. Tamper-detection scheme for BTC-compressed images with high-quality images. KSII Trans. Internet Inf. Syst. 2014, 8, 2005–2021. [Google Scholar]
  27. Lin, C.C.; Huang, Y.; Tai, W.L. A high-quality image authentication scheme for AMBTC-compressed images. KSII Trans. Internet Inf. Syst. 2014, 8, 4588–4603. [Google Scholar]
  28. Li, W.; Lin, C.C.; Pan, J.S. Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimed. Tools Appl. 2016, 75, 4771–4793. [Google Scholar] [CrossRef]
  29. Lin, C.C.; Huang, Y.; Tai, W.L. A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimed. Tools Appl. 2017, 76, 463–488. [Google Scholar] [CrossRef]
  30. Hong, W.; Chen, M.; Chen, T.S.; Huang, C.C. An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multimed. Tools Appl. 2018, 77, 4677–4695. [Google Scholar] [CrossRef]
  31. Hong, W.; Zhou, X.; Lou, D.C.; Huang, X.; Peng, C. Detectability improved tamper detection scheme for absolute moment block truncation coding compressed images. Symmetry 2018, 10, 318. [Google Scholar] [CrossRef]
  32. Nasrabadi, N.M.; King, R.A. Image coding using vector quantization: A review. IEEE Trans. Commun. 1988, 36, 957–971. [Google Scholar] [CrossRef]
  33. Lema, M.; Mitchell, R. Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 1984, 32, 1148. [Google Scholar] [CrossRef]
  34. Delp, E.J.; Mitchell, O.R. Image compression using block truncation coding. IEEE Trans. Commun. 1979, 27, 1335. [Google Scholar] [CrossRef]
  35. Zhang, X. Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 2011, 18, 255–258. [Google Scholar] [CrossRef]
  36. Nguyen, D.V.; Vasic, B. Two-bit bit flipping algorithms for LDPC codes and collective error correction. IEEE Trans. Commun. 2014, 62, 1153–1163. [Google Scholar] [CrossRef]
  37. Hamming, R.W. Error Detecting and Error Correcting Codes. Bell Syst. Tech. J. 1950, 29, 147–160. [Google Scholar] [CrossRef]
  38. Chen, K.; Chang, C.C. Real-time error-free reversible data hiding in encrypted images using (7, 4) hamming code and most significant bit prediction. Symmetry 2019, 11, 51. [Google Scholar] [CrossRef]
  39. Liu, S.; Fu, Z.; Yu, B. Rich QR codes with three-layer information using hamming code. IEEE Access 2019, 7, 78640–78651. [Google Scholar] [CrossRef]
Figure 1. Flowchart of the authentication code generation and embedding.
Figure 1. Flowchart of the authentication code generation and embedding.
Symmetry 11 00996 g001
Figure 2. Examples of preprocessing and generation of the to-be-flipped bit-location information when (a) h l ; (b) h = l   &   l 0 .
Figure 2. Examples of preprocessing and generation of the to-be-flipped bit-location information when (a) h l ; (b) h = l   &   l 0 .
Symmetry 11 00996 g002
Figure 3. Example of adjusted quantization levels matching based data hiding.
Figure 3. Example of adjusted quantization levels matching based data hiding.
Symmetry 11 00996 g003
Figure 4. Flowchart of tampering detection.
Figure 4. Flowchart of tampering detection.
Symmetry 11 00996 g004
Figure 5. Examples: (a) example of extracting bit-location information, (b) example of extracting authentication code.
Figure 5. Examples: (a) example of extracting bit-location information, (b) example of extracting authentication code.
Symmetry 11 00996 g005
Figure 6. Nine 512 × 512 grayscale images. (a) Couple; (b) boat; (c) Zelda; (d) Lena; (e) woman; (f) Elaine; (g) baboon; (h) lake; (i) peppers.
Figure 6. Nine 512 × 512 grayscale images. (a) Couple; (b) boat; (c) Zelda; (d) Lena; (e) woman; (f) Elaine; (g) baboon; (h) lake; (i) peppers.
Symmetry 11 00996 g006
Figure 7. Cropping attack: watermarked images for (a) Lena (PSNR = 31.99 dB); (b) Elaine (PSNR = 32.41 dB); (c) woman (PSNR = 35.03 dB). Tampered images for (d) Lena, (e) Elaine, (f) woman. Tampering detection results after first hierarchy for (g) TDR = 98.75%; (h) TDR = 98.60%; (i) TDR = 98.99%.
Figure 7. Cropping attack: watermarked images for (a) Lena (PSNR = 31.99 dB); (b) Elaine (PSNR = 32.41 dB); (c) woman (PSNR = 35.03 dB). Tampered images for (d) Lena, (e) Elaine, (f) woman. Tampering detection results after first hierarchy for (g) TDR = 98.75%; (h) TDR = 98.60%; (i) TDR = 98.99%.
Symmetry 11 00996 g007
Figure 8. Constant average attack: watermarked images for (a) Zelda (PSNR = 35.07 dB); (d) baboon (PSNR = 27.78 dB). Tampered images for (b) Zelda (2 × 2); (e) baboon (4 × 4). Tampering detection results after the first hierarchy for (c) TDR = 96.42%; (f) TDR = 99.02%.
Figure 8. Constant average attack: watermarked images for (a) Zelda (PSNR = 35.07 dB); (d) baboon (PSNR = 27.78 dB). Tampered images for (b) Zelda (2 × 2); (e) baboon (4 × 4). Tampering detection results after the first hierarchy for (c) TDR = 96.42%; (f) TDR = 99.02%.
Symmetry 11 00996 g008
Figure 9. Collage attack: watermarked images for (a) lake (PSNR = 29.88 dB); (b) pepper (PSNR = 32.15 dB); (e) boat (PSNR = 30.89 dB); (f) couple (PSNR = 30.38 dB). Tampered images for (c) lake; (g) boat. Tampering detection results after the first hierarchy for (d) TDR = 98.45%; (h) TDR = 98.59%.
Figure 9. Collage attack: watermarked images for (a) lake (PSNR = 29.88 dB); (b) pepper (PSNR = 32.15 dB); (e) boat (PSNR = 30.89 dB); (f) couple (PSNR = 30.38 dB). Tampered images for (c) lake; (g) boat. Tampering detection results after the first hierarchy for (d) TDR = 98.45%; (h) TDR = 98.59%.
Symmetry 11 00996 g009
Figure 10. AMBTC compression codes’ attacks: Tampered Lena images by kinds of attacks: (a) H or L; (b) (H or L) and flower; (c) BM; (d) BM and flower. Tampering detection results after the first hierarchy for kinds of attacks: (e) TDR = 100%; (f) TDR = 99.42%; (g) TDR = 100%; (h) TDR = 99.22%.
Figure 10. AMBTC compression codes’ attacks: Tampered Lena images by kinds of attacks: (a) H or L; (b) (H or L) and flower; (c) BM; (d) BM and flower. Tampering detection results after the first hierarchy for kinds of attacks: (e) TDR = 100%; (f) TDR = 99.42%; (g) TDR = 100%; (h) TDR = 99.22%.
Symmetry 11 00996 g010
Table 1. Comparisons of the proposed scheme and other schemes [23,25,26,27,28,29,30,31].
Table 1. Comparisons of the proposed scheme and other schemes [23,25,26,27,28,29,30,31].
MethodsTampering Detection Result for First Stage (%)Requirement of Reference MatrixMain Limitation
Scheme in [23]93.75NoCompression codes’ attack, Collage attack
Scheme in [25]96.87No
Scheme in [26]93.75Yes
Scheme in [27]93.75No
Scheme in [28]93.75Yes
Scheme in [29]93.75YesCompression codes’ attack
Scheme in [30]93.75YesMore computation
Scheme in [31]98.50/99.61NoCollage attack
Proposed scheme99.85No-
Table 2. The cosets of the (7, 4) Hamming code with the parity check matrix, H.
Table 2. The cosets of the (7, 4) Hamming code with the parity check matrix, H.
ID01234567
Syndrome000001010011100101110111
Coset leader00000001000000010000000100000001000000010000000100000001
Table 3. Main symbols used in this paper and their definitions.
Table 3. Main symbols used in this paper and their definitions.
SymbolsDefinitionsSymbolsDefinitions
IOriginal imageWIWatermarked image
HParity check matrixTMTampered map
hHigh quantization level for a block in IHA set of h
lLow quantization level for a block in ILA set of l
bmBitmap for a block in IBMA set of bm
h ^ Preprocessed high quantization level H ^ A set of h ^
l ^ Preprocessed low quantization level L ^ A set of l ^
b m ^ Preprocessed bitmap B M ^ A set of b m ^
h′High quantization level for a block in WIH′A set of h′
l′Low quantization level for a block in WIL′A set of l′
bm′Bitmap for a block in WIBM′A set of bm′
g1, g2Bit-location information of a blockacAuthentication code for a block
Table 4. Tampering detection performance of the cropping attack.
Table 4. Tampering detection performance of the cropping attack.
Original
Images
Number of Tampered Blocks (4 × 4)The First Hierarchical Tampering Detection Results (%)The Second Hierarchical Tampering Detection Results (%)
TotalFirst HierarchySecond HierarchyTDRFPRFNRTDRFPRFNR
Lena96194996198.7500.077710000
Elaine57005620569898.6000.743299.9600.0187
Woman29629329698.9900.018610000
Average98.7800.335699.9900.0063
Table 5. Tampering detection performance of the constant average attack.
Table 5. Tampering detection performance of the constant average attack.
Size of BlocksOriginal
Images
Number of Tampered BlocksThe First Hierarchical Tampering Detection Results (%)The Second Hierarchical Tampering Detection Results (%)
TotalFirst HierarchySecond HierarchyTDRFPRFNRTDRFPRFNR
4 × 4Zelda12251196122597.6300.190910000
Baboon12251213122599.0200.079110000
2 × 2Zelda13691320136796.4200.325399.8500.0133
Baboon13691333136897.3700.239299.9300.0067
Average97.6100.208699.9500.0050
Table 6. Tampering detection performance of the collage attack.
Table 6. Tampering detection performance of the collage attack.
Original MagesNumber of Tampered Blocks (4 × 4)The First Hierarchical Tampering Detection Results (%)The Second Hierarchical Tampering Detection Results (%)
TotalFirst HierarchySecond HierarchyTDRFPRFNRTDRFPRFNR
Lake41264062412198.4500.519499.880.04850.0408
Boat13501331135098.5900.126210000
Average98.5200.322899.940.02430.0204
Table 7. Tampering detection performance of the AMBTC compression codes’ attack.
Table 7. Tampering detection performance of the AMBTC compression codes’ attack.
Original
image
Kinds of AttacksNumber of Tampered Blocks
(4 × 4)
The First Hierarchical Tampering Detection Results (%)The Second Hierarchical Tampering Detection Results (%)
TotalFirst HierarchySecond HierarchyTDRFPRFNRTDRFPRFNR
Lena(H or L)9619619611000010000
(H or L) and flower12111204120899.4200.046199.750.08270.0198
BM6516516511000010000
BM and flower90189489899.2200.045299.670.11120.0194
Average99.6600.022899.860.04850.0098
Table 8. PSNRs of the reconstructed image by the different schemes with block size 4 × 4.
Table 8. PSNRs of the reconstructed image by the different schemes with block size 4 × 4.
Original ImagesPSNRs (dB)
AMBTCProposed Scheme
Couple31.2730.38
Boat31.8730.89
Zelda37.9935.07
Lena33.2331.99
Woman37.9835.03
Elaine33.9132.41
Baboon28.3027.78
Lake29.8829.21
Peppers33.4332.15
Average33.1031.66
Table 9. Tampering detection performance of different schemes.
Table 9. Tampering detection performance of different schemes.
MethodsNumber of Authentication BitsHierarchy of Detection StrategiesTDR of First Hierarchy (%)TDR of Multi-Hierarchy (%)Average PSNRs (dB)
Lin et al. [29]4293.7598.1933.07
Hong et al. [30]4293.7599.8332.33
Hong et al. [31] (LSBP)/(MSBP)6298.5099.6631.27/31.73
899.6128.92/29.84
Proposed scheme6298.5599.8531.66
Table 10. Comparisons with various schemes.
Table 10. Comparisons with various schemes.
Compared ListsLin et al.’s Scheme [29]Hong et al.’s Scheme [30]Hong et al.’s Scheme [31]Proposed Scheme
Components to embed ACQuantization levels or bitmapQuantization levelsQuantization levels Quantization levels and bitmap
Generation of ACPseudo-random generatorHash functionHash functionHash function
Detection of the special modification of bitmapNoYesYesYes
Detection of the special modification of quantization levelsNoYesYesYes
Detection of the cropping attackYesYesYesYes
Detection of the constant average attackYesYesYesYes
Detection of the collage attackYesYesNoYes
Authentication for AMBTC compression codesYesYesYesYes
Authentication for AMBTC compressed imageYesNoNoYes
Table 11. Comparisons with other schemes based on different compression techniques.
Table 11. Comparisons with other schemes based on different compression techniques.
MethodsCompression MethodologyDomainDetectable Block SizeLength of AC for a BlockPSNR
(dB)
Scheme in [17]JPEGFrequency4 × 41[40.33, 44.12]
Scheme in [18]JPEGFrequency8 × 8344.63
Scheme in [19]VQSpace4 × 4, 8 × 8[1, 3]≈[29.00, 31.50]
Proposed schemeAMBTCSpace4 × 4[1, 6][31.66, 33.10]

Share and Cite

MDPI and ACS Style

Su, G.-D.; Chang, C.-C.; Lin, C.-C. High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry 2019, 11, 996. https://doi.org/10.3390/sym11080996

AMA Style

Su G-D, Chang C-C, Lin C-C. High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry. 2019; 11(8):996. https://doi.org/10.3390/sym11080996

Chicago/Turabian Style

Su, Guo-Dong, Chin-Chen Chang, and Chia-Chen Lin. 2019. "High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images" Symmetry 11, no. 8: 996. https://doi.org/10.3390/sym11080996

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop