A chaotic system based fragile watermarking scheme for image tamper detection

被引:111
作者
Rawat, Sanjay [1 ]
Raman, Balasubramanian [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Math, Roorkee 247667, Uttar Pradesh, India
关键词
Tamper detection; Chaotic map; Authentication; Digital watermarking; AUTHENTICATION; OWNERSHIP;
D O I
10.1016/j.aeue.2011.01.016
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the past few years, various fragile watermarking techniques have been proposed for image authentication and tamper detection. In this paper, a novel chaos based watermarking scheme for image authentication and tamper detection is proposed. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. Our scheme can detect any modification made to the image and can also indicate the specific locations that have been modified. To improve the security of the proposed scheme two chaotic maps are employed. Since chaotic maps are sensitive to initial values, the corresponding position relation between pixels in the watermarked image and the watermark get disturbed, which helps the watermarking scheme to withstand counterfeiting attacks. Initial values of the chaotic maps are used as secret keys in our scheme. The effectiveness of the proposed scheme is checked through a series of attacks. Experimental results demonstrate that the proposed scheme is not only secure but also achieves superior tamper detection and localization accuracy under different attacks. For instance in copy-and-paste attack and collage attack. (C) 2011 Elsevier GmbH. All rights reserved.
引用
收藏
页码:840 / 847
页数:8
相关论文
共 20 条
[1]  
[Anonymous], CHAOS SOLITON FRACT
[2]  
[Anonymous], P IEEE INT C IM PROC
[3]  
[Anonymous], P SPI EINTERNATIONAL
[4]  
[Anonymous], P IEEE ICASSP SALT L
[5]  
[Anonymous], P IEEE INT C MULT CO
[6]  
[Anonymous], P IEEE INT C IM PROC
[7]  
[Anonymous], 1999, PICS
[8]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[9]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[10]   A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J].
Chen, Wei-Che ;
Wang, Ming-Shi .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :1300-1307