• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种具有高图像保真度的 AMBTC 篡改检测方案的位翻转方法。

A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.

机构信息

School of Electrical and Computer Engineering, Nanfang College of Sun Yat-Sen University, Guangzhou, China.

Department of Computer Science and Information Engineering, Chang Gung University, Taoyuan, Taiwan.

出版信息

PLoS One. 2020 Apr 16;15(4):e0230997. doi: 10.1371/journal.pone.0230997. eCollection 2020.

DOI:10.1371/journal.pone.0230997
PMID:32298280
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7162451/
Abstract

The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. However, the marked image qualities of these schemes can be enhanced, and their authentication methods may fail to detect some special tampering. We propose a secure AMBTC tamper detection scheme that preserves high image fidelity with excellent detectability. In the proposed approach, a bit in bitmaps of AMBTC codes is sequentially toggled to generate a set of authentication codes. The one that causes the least distortion is embedded into the quantization levels with the guidance of a key-generated reference table (RT). Without the correct key, the same reference table cannot be constructed. Therefore, the proposed method is able to detect various kinds of malicious tampering, including those special tampering techniques designed for RT-based authentication schemes. The proposed method not only offers better image quality, but also provides an excellent and satisfactory detectability as compared with previous works.

摘要

现有的绝对矩块截断编码 (AMBTC) 压缩图像篡改检测方案能够检测到篡改。然而,这些方案的标记图像质量可以得到提高,并且它们的认证方法可能无法检测到某些特殊的篡改。我们提出了一种安全的 AMBTC 篡改检测方案,该方案具有出色的可检测性和高图像保真度。在提出的方法中,AMBTC 码的位图中的一位被顺序切换,以生成一组认证码。在密钥生成的参考表 (RT) 的指导下,将导致失真最小的位嵌入到量化级别中。没有正确的密钥,就无法构建相同的参考表。因此,该方法能够检测各种恶意篡改,包括针对基于 RT 的认证方案设计的特殊篡改技术。与以前的工作相比,该方法不仅提供了更好的图像质量,而且还提供了出色且令人满意的可检测性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/1bc7f190f892/pone.0230997.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/6407d4a07d88/pone.0230997.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/a60ca38201dd/pone.0230997.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/6c0b4aae728b/pone.0230997.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/e4f52096c4ca/pone.0230997.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/bffb9bc86a8a/pone.0230997.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/ddcc9382ddf4/pone.0230997.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/3930d3a9fee8/pone.0230997.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/c5179111a9e9/pone.0230997.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/4da3d0f0a36f/pone.0230997.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/85d130865e35/pone.0230997.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/2eff027aba4f/pone.0230997.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/aca20c0cd742/pone.0230997.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/3f3f0ec22352/pone.0230997.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/1bc7f190f892/pone.0230997.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/6407d4a07d88/pone.0230997.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/a60ca38201dd/pone.0230997.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/6c0b4aae728b/pone.0230997.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/e4f52096c4ca/pone.0230997.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/bffb9bc86a8a/pone.0230997.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/ddcc9382ddf4/pone.0230997.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/3930d3a9fee8/pone.0230997.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/c5179111a9e9/pone.0230997.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/4da3d0f0a36f/pone.0230997.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/85d130865e35/pone.0230997.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/2eff027aba4f/pone.0230997.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/aca20c0cd742/pone.0230997.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/3f3f0ec22352/pone.0230997.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/feef/7162451/1bc7f190f892/pone.0230997.g014.jpg

相似文献

1
A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.一种具有高图像保真度的 AMBTC 篡改检测方案的位翻转方法。
PLoS One. 2020 Apr 16;15(4):e0230997. doi: 10.1371/journal.pone.0230997. eCollection 2020.
2
A recoverable AMBTC authentication scheme using similarity embedding strategy.基于相似性嵌入策略的可恢复 AMBTC 认证方案
PLoS One. 2019 Feb 27;14(2):e0212802. doi: 10.1371/journal.pone.0212802. eCollection 2019.
3
Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.鲁棒的秘密图像共享方案抵抗 AMBTC 和量化的恶意篡改阴影。
Gene Expr Patterns. 2022 Sep;45:119267. doi: 10.1016/j.gep.2022.119267. Epub 2022 Aug 5.
4
Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy.可视物联网安全:基于块嵌入策略的 AMBTC 图像数据隐藏
Sensors (Basel). 2019 Apr 27;19(9):1974. doi: 10.3390/s19091974.
5
AMBTC-based visual secret sharing with different meaningful shadows.基于AMBTC的具有不同有意义阴影的可视秘密共享
Math Biosci Eng. 2021 Jun 11;18(5):5236-5251. doi: 10.3934/mbe.2021266.
6
Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.基于块映射和双矩阵的图像认证自恢复水印技术。
PLoS One. 2024 Feb 2;19(2):e0297632. doi: 10.1371/journal.pone.0297632. eCollection 2024.
7
Tamper detection and recovery for medical images using near-lossless information hiding technique.使用近无损信息隐藏技术的医学图像篡改检测与恢复
J Digit Imaging. 2008 Mar;21(1):59-76. doi: 10.1007/s10278-007-9011-1. Epub 2007 Mar 28.
8
A novel blind watermarking of ECG signals on medical images using EZW algorithm.一种使用EZW算法在医学图像上对心电图信号进行的新型盲水印技术。
Conf Proc IEEE Eng Med Biol Soc. 2006;2006:3274-7. doi: 10.1109/IEMBS.2006.259603.
9
High-Payload Data-Hiding Method for AMBTC Decompressed Images.用于 AMBTC 解压缩图像的高负载数据隐藏方法
Entropy (Basel). 2020 Jan 25;22(2):145. doi: 10.3390/e22020145.
10
Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication.基于 ROI 分割和多级认证的篡改定位和无损恢复数字水印方案。
J Digit Imaging. 2013 Apr;26(2):316-25. doi: 10.1007/s10278-012-9484-4.

本文引用的文献

1
A recoverable AMBTC authentication scheme using similarity embedding strategy.基于相似性嵌入策略的可恢复 AMBTC 认证方案
PLoS One. 2019 Feb 27;14(2):e0212802. doi: 10.1371/journal.pone.0212802. eCollection 2019.