Open Access Open Access  Restricted Access Subscription or Fee Access

Chaotic Maps Based Scheme for Image Authentication

Karanam Sreenivas, V. Kamakshiprasad

Abstract


In this paper a watermarking scheme for image authentication using the chaotic maps is proposed. Depending on the contents of the 2 x 2 image block, Arnold’s Cat map iterations are used to generate the block authentication watermark bits. As the authentication bits are block content dependent, any changes to the content affects the authentication bits. The watermark bits are then embedded in the 3 LSBs of the block. The experimental results show that the tamper localisation capacity of the scheme under various attacks such as object insertion, deletion and vector quantization attacks is superior to some of the recently proposed schemes.

Keywords


Digital Watermarking, Fragile Watermarking, Image Authentication, Tamper Localization

Full Text:

PDF

References


Phen Lan Lin, Chung-Kai Hsieh, Po-Whei Huang, (2005) “A hierarchical digital watermarking method for image tamper detection and recovery”, Pattern Recognition 38 2519 – 2529.

Tien-You Lee, Shinfeng D. Lin, (2008) “Dual watermark for image tamper detection and recovery”, Pattern Recognition 41 3497 – 3506.

Shui-Hua Han, Chao-Hsien Chu, (2010) “Content-based image authentication: current status, issues, and challenges”, Int. J. Inf. Secur. 9:19–32.

Chan, C.S., Chang, C.C., 2007. “An efficient image authentication method based on Hamming code”, Pattern Recognition 40 (February (2)), 681–690.

Chi-Shiang Chan, (2011) “An image authentication method by applying Hamming code on rearranged bits”, Pattern Recognition Letters 32 1679–1690.

Hong-Jie He, Jia-Shu Zhang, and Heng-Ming Tai, (2009) “Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization”, IH 2009, LNCS 5806, pp. 132–145.

H. He, et al., Adjacent-block based statistical detection method for self-embedding watermarking techniques, Signal Process. 89 (8) (2009) 1557–1566.

Hong-Jie He, Jia-Shu Zhang, and Heng-Ming Tai, Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization, IH 2009, LNCS 5806, pp. 132–145, 2009.

Bin Li etc, A Survey on Image Steganography and Steganalysis, Journal of Information Hiding and Multimedia Signal Processing(2011) Volume 2, Number 2, April 2011.

D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.

Adil Haouzia & Rita Noumeir, Methods for image authentication: a surveyMultimed Tools Appl (2008) 39:1–46.

Xiaojun Qi , Xing Xin, A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, J. Vis. Commun. Image R. 30 (2015) 312–327.

]S. Bravo-Solorio L. Gan, A.K. Nandi M.F. Aburdene, Secure private fragile watermarking scheme with improved tampering localisation accuracy, IET Inf. Secur., 2010, Vol. 4, Iss. 3, pp. 137–148.

HE H., ZHANG J., TAI H.M.: ‘A wavelet-based fragile watermarking scheme for secure image authentication’. Proc. IWDW – Int. Workshop on Digital Watermarking,NCS, 2006, vol. 4283, pp. 422–432.

Chin-Chen Chang , Yi-Hui Chen , Hsin-Chi Wang,” Meaningful secret sharing technique with authentication and remedy abilities”, Information Sciences 181 (2011) 3073–3084.

D.C. Lou, H.K. Tso, J.L. Liu, A copyright protection scheme for digital images using visual cryptography technique, Computer Standards and Interfaces 29 (1) (2007) 125–131.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.