A chaotic fragile watermarking algorithm for image authentication

被引:0
|
作者
Zhu, Congxu [1 ]
Huang, Dazu
Hu, Yuping
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
[2] Hunan Finance & Econ Coll, Dept Informat Management, Changsha 410205, Peoples R China
关键词
fragile watermark; authentication; chaos;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has been tampered, and distinguish tampered areas from non-tampered areas without referring to the original digital content. In this paper, a novel fragile watermarking scheme for image authentication is presented. Giving the initial value of the chaotic mapping, the fragile watermark is obtained by iterating several times of the chaotic mapping. The watermark is then inserted into the two least significant bit (LSB) planes of the host image. The proposed scheme can localize the tampers on the watermarked image by using to the high sensitivity on initial value of the chaotic mapping. Moreover, no host image is needed in watermark extraction. Our simulation results show the effectiveness, sensitivity and localization of tamper-proofing of this algorithm.
引用
收藏
页码:829 / 833
页数:5
相关论文
共 50 条
  • [1] Novel Chaotic Fragile Watermarking Algorithm for Image Authentication
    刘培培
    朱中梁
    [J]. Railway Engineering Science, 2009, 17 (02) : 123 - 128
  • [2] Invertible chaotic fragile watermarking for robust image authentication
    Sidiropoulos, Panagiotis
    Nikolaidis, Nikos
    Pitas, Ioannis
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 42 (05) : 2667 - 2674
  • [3] A New Semi-fragile Watermarking Algorithm for Image Authentication
    Bo, Li
    Xu, Tao
    Ji, Shengli
    Jin, Hao
    Zhang, Aiqin
    [J]. 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 5928 - +
  • [4] A new semi-fragile watermarking algorithm for image authentication
    韩德志
    [J]. Journal of Chongqing University(English Edition), 2005, (01) : 41 - 46
  • [5] A novel image fragile watermarking algorithm based on chaotic map
    Liu, Pei-pei
    Zhu, Zhong-liang
    Wang, Hong-xia
    Yan, Tian-yun
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 5, PROCEEDINGS, 2008, : 631 - 634
  • [6] Scalable fragile watermarking for image authentication
    Piper, Angela
    Safavi-Naini, Reihaneh
    [J]. IET INFORMATION SECURITY, 2013, 7 (04) : 300 - 311
  • [7] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [8] Fragile watermarking for color image authentication
    Monzoy-Villuendas, M.
    Salinas-Rosales, M.
    Nakano-Miyatake, M.
    Perez-Meana, H. M.
    [J]. 2007 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING, 2007, : 88 - 91
  • [9] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [10] A Fragile Watermarking Algorithm for Hologram Authentication
    Cheng, Chau-Jern
    Hwang, Wen-Jyi
    Zeng, Han-Yi
    Lin, Yu-Chih
    [J]. JOURNAL OF DISPLAY TECHNOLOGY, 2014, 10 (04): : 263 - 271