A probabilistic image authentication method based on chaos

被引:6
|
作者
Tuncer, Turker [1 ]
机构
[1] Firat Univ, Fac Technol, Dept Digital Forens Engn, Elazig, Turkey
关键词
Chaotic symmetric network based watermark generation; Probabilistic image authentication; Neural network; Chaotic maps; Fragile watermarking; DWT-SVD based image recovery; FRAGILE WATERMARKING SCHEME; TAMPER LOCALIZATION; DIGITAL IMAGES; STEGANOGRAPHY; ALGORITHM; RECOVERY; MAP; CAPABILITY; ROBUST;
D O I
10.1007/s11042-017-5569-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fragile watermarking methods have been used as active image authentication methods. These methods must have capabilities like high capacity, high visual quality, high image authentication ability and image recovery capability. Many of the fragile watermarking methods suggested in the literature do not provide all of these capabilities. In this article, a new probabilistic image authentication method with high capacity, high visual quality, high image authenticity ability and image recovery capability is proposed. Chaotic pseudo random number generators, a new watermark generation network which similar to neural network, modulo based watermark embedding functions, modulo based watermark extraction functions, tamper detection algorithm and perceptual hash based image recovery algorithm are utilized for creating a new probabilistic image authentication method in this article. The proposed method is a block based authentication method and 3 x 3 size of overlapping neighborhood blocks are used in this method. The proposed watermark generation network uses symmetric pixels as inputs and weights to generate predicted pixel. In this step, modulo operator and random numbers are used for calculating embeddable value. Owing to chaotic random number generator, the proposed method gains probabilistic and nonlinear structure. To generate random number, logistic map is used as random number generator in the proposed image watermarking method. Then, a modulo based watermark embedding function is used for embedding embeddable value (generated watermark). In the watermark extraction step, modulo operator is used. If the predicted value differs from the extracted value, tamper detection is performed. Otherwise, image authentication is success. A new image recovery algorithm is proposed in this method. This algorithm provides image recovery for tampered areas with high visual quality. The proposed image watermarking method can authenticate grayscale and color images. The experimental results demonstrated that, the proposed method has high payload capacity, high visual quality and high image authentication ability.
引用
收藏
页码:21463 / 21480
页数:18
相关论文
共 50 条
  • [1] A probabilistic image authentication method based on chaos
    Türker Tuncer
    [J]. Multimedia Tools and Applications, 2018, 77 : 21463 - 21480
  • [2] A Research on the Medical Image Authentication Watermark Method Based on Chaos
    Zeng Linghong
    Huang Liangyong
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1679 - 1683
  • [3] A Chaos-based Fragile Watermarking Method in Spatial Domain for Image Authentication
    Munir, Rinaldi
    [J]. 2015 INTERNATIONAL SEMINAR ON INTELLIGENT TECHNOLOGY AND ITS APPLICATIONS (ISITIA), 2015, : 227 - 231
  • [4] Color image authentication based on spatiotemporal chaos and SVD
    Peng, Zhenni
    Liu, Wenbo
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 36 (04) : 946 - 952
  • [5] A Novel Probabilistic Image Authentication Method Based On Universal Hash Function For Rgb Images
    Ozyurt, Fatih
    Tuncer, Ttirker
    Avci, Engin
    [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES AND ENGINEERING (ICCSE), 2018,
  • [6] Image Encryption Scheme for Deniable Authentication Based on Chaos Theory
    Zhang, Qiu-Yu
    Liu, Yi-Lin
    Wu, Guo-Rui
    [J]. International Journal of Network Security, 2024, 26 (03) : 454 - 466
  • [7] Image steganography Based on Chaos Permutation, Authentication and Wiener Deconvolution
    Sheidaee, Ali
    Asadpour, Mohammad
    Farzinvash, Leili
    [J]. 2021 29TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2021, : 573 - 578
  • [8] A chaos-based probabilistic block cipher for image encryption
    Dhall, Sakshi
    Pal, Saibal K.
    Sharma, Kapil
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1533 - 1543
  • [9] Image authentication algorithm based on chaos and dual-bit watermarks
    Zhu, Cong-Xu
    [J]. Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 177 - 180
  • [10] Composite chaos-based lossless image authentication and tamper localization
    Gao, Guangyong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 63 (03) : 947 - 964