Presentation is loading. Please wait.

Presentation is loading. Please wait.

Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.

Similar presentations


Presentation on theme: "Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318."— Presentation transcript:

1 Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318 (1-17), Aug. 2018 Author: Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang and Cancan Peng Speaker: Su Guodong Date: 2019/05/16

2 Outline Introduction Related work Proposed scheme Experiments
Conclusions

3 Introduction(1/2) Images 46.5 KB Compressed Original 3010 KB

4 Introduction(2/2) Tamper Authentication (Tamper detection)

5 Related work---AMBTC AMBTC compression code: ( h, l , bm )
130 92 133 137 143 124 106 116 Low quantization level l: 122 bm 130 92 161 165 133 171 169 170 137 175 150 143 124 194 106 116 122 169 1 161 165 171 169 170 175 150 194 High quantization level h: 169 5

6 Proposed scheme(1/8) ---Generation of Authentication codes (ACs)
AMBTC AC: ( a + b ) bits ( h, l , bm ) h 8-a a (hM )d ( a + b ) bits AC Hash function bm aca acb (lM )d 8-b b l

7 Proposed scheme(2/8)---Embedding of ACs
AMBTC AC: ( a + b ) bits ( h, l , bm ) ( h’, l’, bm ) h 8-a a 8-a a (hM )d*2a +(aca )d (hM )d ( a + b ) bits AC (aca )d Hash function bm aca acb (acb )d (lM )d (lM )d*2b +(acb )d 8-b b 8-b b l

8 Proposed scheme(3/8)---Embedding of ACs
AMBTC AC: ( ) bits ( 169, 122 , ‘ ’ ) ( 166, 126 , ‘ ’ ) h 1010 1001 1010 0110 (hM )d*24 +(ac4 )d (hM )d =10 bm= ‘ ’ (ac4 )d = (0100)10=6 ( ) Hash function aca acb (ac3 )d = (110)10 = 6 (lM )d =15 (lM )d*23 +(ac3 )d 01111 010 01111 110 l

9 Proposed scheme(4/8)---Results of LSBR

10 Proposed scheme(5/8)---The MSBs Perturbation Technique (MSBP)
AC: ( a + b ) bits Minimize: (h-h’) 2+(l-l’)2 ( h, l , bm ) ( h’, l’, bm ) h Nine combinations 8-a a 8-a a |(hM )d -(h’M )d |<=1 (h’M )d*2a +(ac’a )d (hM )d (h’M )d (ac’a )d Hash function bm aca acb (ac’b )d (l’M )d (lM )d (l’M )d*2b +(ac’b )d |(lM )d -(l’M )d |<=1 8-b b 8-b b l

11 Proposed scheme(6/8)---Results of MSBP

12 Proposed scheme(7/8)-The Authentication procedures
First stage: ( h, l , bm ) h 8-a a (hM )d Untampered Yes ? Hash function = bm aca acb a b No (lM )d Tampered 8-b b l

13 Proposed scheme(8/8)-The Authentication procedures
Second stage:

14 Experiments(1/5)

15 Experiments(2/5) Results of the first and second stage detections. (a) 1st stage, |ac| = 2; (b) 1st stage, |ac| = 4; (c) 1st stage incorrect detection (|ac| = 4); (d) 2nd stage, |ac| = 2; (e) 2nd stage, |ac| = 4; (f) 2nd stage incorrect detection (|ac| = 4).

16 Experiments(3/5)

17 Experiments(4/5) Second stage detection results of each method.
Lin et al.’s method; (b) Li et al.’s method; (c) Zhong et al.’s method; (d) Proposed method.

18 Experiments(5/5)

19 Conclusions Proposed the MSBs Perturbation Technique to optimize the AMBTC compressed image quality Provided the 8-bit authentication code for high tampering detection rate Adjustable the authentication codes' generation

20 Thanks for your listening!


Download ppt "Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318."

Similar presentations


Ads by Google