A Secure Watermark Embedding Approach Based on Chaotic Map for Image Tamper Detection

被引:0
|
作者
Barani, Milad Jafari [1 ]
Valandar, Milad Yousefi [2 ]
Ayubi, Peyman [2 ]
机构
[1] Islamic Azad Univ, Urmia Branch, Young Researchers & Elite Club, Orumiyeh, Iran
[2] Islamic Azad Univ, Urmia Branch, Dept Comp Engn, Orumiyeh, Iran
关键词
Image Authentication; Tamper Detection; Chaotic map; Jacobian elliptic map; FRAGILE WATERMARKING; DIGITAL WATERMARKING; AUTHENTICATION; SCHEME; LOCALIZATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is an important concept in transferring data such as images, videos and etc. In this paper, a new authentication method based on watermark embedding is proposed which makes us able to detect and localize forged areas in the image. In this method, picture is divided into 2 x 2 blocks and it permuted with a chaotic map and placed into an array, which this array is combined with sequence that generated by Jacobian elliptic map with XOR. Obtained authentication sequence is inserted directly into least significant bits of each pixel in cover image because Inserting data in spatial domain increases image visual quality and using chaotic map in embedding process increase security of proposed algorithm. Results of implementation and testing the proposed technique shows good visual quality and power of localizing tampered areas.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Dual watermark for image tamper detection and recovery
    Lee, Tien-You
    Lin, Shinfeng D.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3497 - 3506
  • [2] Image Tamper Detection and Recovery Using Dual Watermark
    Song Qiang
    Zhang Hongbin
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [3] An Image Fragile Watermarking Scheme Based on Chaotic System for Image Tamper Detection
    Moniruzzaman, Md.
    Hawlader, Md. Abul Kayum
    Hossain, Md. Foisal
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2014,
  • [4] A secure image watermarking for tamper detection and localization
    Siddharth Bhalerao
    Irshad Ahmad Ansari
    Anil Kumar
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1057 - 1068
  • [5] A secure image watermarking for tamper detection and localization
    Bhalerao, Siddharth
    Ansari, Irshad Ahmad
    Kumar, Anil
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 1057 - 1068
  • [6] Watermark hiding technique based on chaotic map
    Wang, HX
    He, C
    Ding, K
    [J]. PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2, 2003, : 1505 - 1508
  • [7] Digital Image Encryption Based on Chaotic Map for Secure Transmission
    Ahmad, Musheer
    Gupta, Chanki
    Varshney, Ankit
    [J]. 2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 292 - 295
  • [8] Image Encryption Based on Logistic Chaotic Map for Secure Communications
    Rodriguez-Sahagun, M. T.
    Mercado-Sanchez, J. B.
    Lopez-Mancilla, D.
    Jaimes-Reategui, R.
    Garcia-Lopez, J. H.
    [J]. 2010 IEEE ELECTRONICS, ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE (CERMA 2010), 2010, : 319 - 324
  • [9] Image Tamper Detection Algorithm Based on Chaotic Theory and Fragile Watermarking
    Zhang, Qing
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 182 - 187
  • [10] A chaotic system based fragile watermarking scheme for image tamper detection
    Rawat, Sanjay
    Raman, Balasubramanian
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2011, 65 (10) : 840 - 847