Pinpoint authentication watermarking based on a chaotic system

被引:19
作者
Ni, Rongrong [1 ]
Ruan, Qiuqi [1 ]
Zhao, Yao [1 ]
机构
[1] Beijing Jiaotong Univ, Inst Informat Sci, Beijing 100044, Peoples R China
基金
中国国家自然科学基金;
关键词
image authentication; localization precision; detection accuracy rate; chaotic system;
D O I
10.1016/j.forsciint.2008.04.016
中图分类号
DF [法律]; D9 [法律]; R [医药、卫生];
学科分类号
0301 ; 10 ;
摘要
Watermarking technique is one of the active research fields in recent ten years, which can be used in copyright management, content authentication, and so on. For the authentication watermarking, tamper localization and detection accuracy are two important performances. However, most methods in literature cannot obtain precise localization. In addition, few researchers pay attention to the problem of detection accuracy. In this paper, a pinpoint authentication watermarking is proposed based on a chaotic system, which is sensitive to the initial value. The approach can not only exactly localize the malicious manipulations but reveal block substitutions when Holliman-Memon attack (VQ attack) occurs. An image is partitioned into non-overlapped regions according to the requirement on precision. In each region, a chaotic model is iteratively applied to produce the chaotic sequences based on the initial values, which are determined by combining the prominent luminance values of pixels, position information and an image key. Subsequently, an authentication watermark is constructed using the binary chaotic sequences and embedded in the embedding space. At the receiver, a detector extracts the watermark and localizes the tampered regions without access to the host image or the original watermark. The precision of spatial localization can attain to one pixel, which is valuable to the images observed at non-ordinary distance, such as medical images and military images. The detection accuracy rate is defined and analyzed to present the probability of a detector making right decisions. Experimental results demonstrate the effectiveness and advantages of our algorithm. Crown Copyright (C) 2008 Published by Elsevier Ireland Ltd. All rights reserved.
引用
收藏
页码:54 / 62
页数:9
相关论文
共 13 条
[1]   Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[2]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[3]  
Cox I., 2001, Digital Watermarking
[4]  
Fridrich J, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P404, DOI 10.1109/ICIP.1998.723401
[5]  
HAN SJ, 2003, INT WORKSH DIG WAT K, P347
[6]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[7]   Watermarking digital image and video data - A state-of-the-art overview [J].
Langelaar, GC ;
Setyawan, I ;
Lagendijk, RL .
IEEE SIGNAL PROCESSING MAGAZINE, 2000, 17 (05) :20-46
[8]   Secure semi-blind watermarking based on iteration mapping and image features [J].
Ni, RR ;
Ruan, QQ ;
Cheng, HD .
PATTERN RECOGNITION, 2005, 38 (03) :357-368
[9]  
WALTON S, 1995, DR DOBBS J, V20, P18
[10]  
Wu JH, 2004, IEEE IMAGE PROC, P1573