A Secure Watermark Embedding Approach Based on Chaotic Map for Image Tamper Detection

被引:0
|
作者
Barani, Milad Jafari [1 ]
Valandar, Milad Yousefi [2 ]
Ayubi, Peyman [2 ]
机构
[1] Islamic Azad Univ, Urmia Branch, Young Researchers & Elite Club, Orumiyeh, Iran
[2] Islamic Azad Univ, Urmia Branch, Dept Comp Engn, Orumiyeh, Iran
关键词
Image Authentication; Tamper Detection; Chaotic map; Jacobian elliptic map; FRAGILE WATERMARKING; DIGITAL WATERMARKING; AUTHENTICATION; SCHEME; LOCALIZATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is an important concept in transferring data such as images, videos and etc. In this paper, a new authentication method based on watermark embedding is proposed which makes us able to detect and localize forged areas in the image. In this method, picture is divided into 2 x 2 blocks and it permuted with a chaotic map and placed into an array, which this array is combined with sequence that generated by Jacobian elliptic map with XOR. Obtained authentication sequence is inserted directly into least significant bits of each pixel in cover image because Inserting data in spatial domain increases image visual quality and using chaotic map in embedding process increase security of proposed algorithm. Results of implementation and testing the proposed technique shows good visual quality and power of localizing tampered areas.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [21] Image tamper detection and recovery using differential embedding strategy
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    2011 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2011, : 399 - 402
  • [22] Image tamper detection and recovery using adaptive embedding rules
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    MEASUREMENT, 2016, 88 : 287 - 296
  • [23] Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency
    Du, Ling
    Chen, Zhen
    Ke, Yongzhen
    ADVANCES IN MULTIMEDIA, 2018, 2018
  • [24] Image steganography algorithm based on cascaded chaotic map and low bits embedding
    Mu Jun
    CHINESE JOURNAL OF LIQUID CRYSTALS AND DISPLAYS, 2020, 35 (04) : 374 - 382
  • [25] Secure digital watermark generation based on chaotic Kolmogorov flows
    Scharinger, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 306 - 313
  • [26] An Image Tamper Detection and Recovery Method Based on Self-Embedding Dual Watermarking
    Kiatpapan, Sawiya
    Kondo, Toshiaki
    2015 12TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2015,
  • [27] Hologram watermark technique based on image partly embedding
    Liu, Xiao-Ke
    Su, Xian-Yu
    Guangzi Xuebao/Acta Photonica Sinica, 2008, 37 (04): : 740 - 744
  • [28] Logistic-map based fragile image watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Hassaballah, M.
    Rao, Routhu Srinivasa
    Suresh, Gulivindala
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) : 24069 - 24100
  • [29] Image encryption approach based on a chaotic map by diagonal stretch
    Department of Electrical and Information Engineering, Hunan Institute of Engineering, Xiangtan 411104, China
    不详
    Guangdianzi Jiguang, 2008, 1 (100-103+110):
  • [30] Digital Watermark Algorithm Based on Embedding Gray Image into Color Image
    Gao Jing-wei
    Li Han-guo
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL II, PROCEEDINGS, 2009, : 146 - +