Perceptual Mapping-Based Image Tamper Detection and Recovery Algorithm

被引:0
|
作者
Taha, Taha Basheer [1 ,2 ]
Ngadiran, Ruzelita [2 ]
Taha, Dujan B. [3 ]
机构
[1] Tishk Int Univ, Fac Appl Sci, Erbil, Kurdistan Reg, Iraq
[2] Univ Malaysia Perlis, Fac Elect Engn Technol, Ctr Excellence Adv Comp AdvComp, Perlis, Malaysia
[3] Univ Mosul, Coll Comp Sci & Math, Software Engn Dept, Mosul, Iraq
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The importance of digital image authentication has grown in the last decade particularly with the widespread availability of digital media and image manipulation tools. As a result, different techniques were developed to detect fraudulent alterations in digital images and restore the original data. In this paper, a new algorithm is proposed to authenticate images by hiding a copy of the approximation band in the original image. The approximation band is hidden by embedding it inside the image pixels. The intensity of the hiding was decided using a perceptual map that simulates the human vision system and adds more intensity in areas where the human eye cannot recognize changes. The perceptual map consists of three parts, luminance mask, texture mask, and edge detection mask. Results show a high ability to blindly recover images after different attacks such as removing and blocking attacks. At the same time, the structure similarity index of resultant images was higher than 0.99 for all tested images.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency
    Du, Ling
    Chen, Zhen
    Ke, Yongzhen
    ADVANCES IN MULTIMEDIA, 2018, 2018
  • [22] Image Tamper Detection Algorithm Based on Chaotic Theory and Fragile Watermarking
    Zhang, Qing
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 182 - 187
  • [23] A Fragile Watermarking Algorithm for Image Tamper Detection Based on Chaotic Maps
    Lazarov, Nikodim
    Ilcheva, Zlatoliliya
    2016 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2016, : 723 - 728
  • [24] Complex Mapping-Based Blind Image Superresolution
    Kara, Fatih
    Vural, Cabir
    2008 IEEE 16TH SIGNAL PROCESSING, COMMUNICATION AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2008, : 765 - +
  • [25] A secure image authentication scheme for tamper detection and recovery
    Chen, T-Y
    Hwang, M-S
    Jan, J-K
    IMAGING SCIENCE JOURNAL, 2012, 60 (04): : 219 - 233
  • [26] Reversible Medical Image Watermarking For Tamper Detection And Recovery
    Liew, Siau-Chuin
    Zain, Jasni Mohamad
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 417 - 420
  • [27] A Refining Localization Watermarking for Image Tamper detection and Recovery
    Cheng, Baotian
    Ni, Rongrong
    Zhao, Yao
    PROCEEDINGS OF 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP) VOLS 1-3, 2012, : 984 - 988
  • [28] A fragile watermarking scheme for tamper detection and recovery of image
    Zhu, Haifeng
    Chao, Chunhui
    Tang, Chunming
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 475 - 475
  • [29] Image Tamper Detection and Recovery Using Dual Watermark
    Song Qiang
    Zhang Hongbin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [30] Tamper Detection and Self-Recovery of Image Based on Self-Embedding
    Song Qiang
    Wang Jiawen
    Zhang Hongbin
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 76 - 79