A logistic map based blind and fragile watermarking for tamper detection and localization in images

被引:0
|
作者
Aditya Kumar Sahu
机构
[1] GMRIT,Department of Computer Science and Engineering
关键词
Fragile watermarking; Logistic map; Tamper detection and localization; Least significant bit;
D O I
暂无
中图分类号
学科分类号
摘要
In real-time data transmission, the protection of multimedia content from unauthorized access is pivotal. In this context, digital watermarking techniques have drawn significant attention from the past few decades. However, most of the reported techniques fail to achieve a good balance among the perceptual transparency, embedding capacity (EC), and robustness. Besides, tamper detection and localization are the two crucial aspects of any authentication based watermarking technique. This paper proposes a logistic map based fragile watermarking technique to efficiently detect and localize the tampered regions from the watermarked image (WI). The proposed technique takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Next, these watermark bits are embedded in the rightmost least significant bits (LSBs) by performing the logical XOR operation between the first intermediate significant bits (ISBs) and the watermark bits. Simulation results show that the proposed technique can produce high quality WI with an average peak signal-to-noise ratio (PSNR) of 51.14 dB. Further, the proposed technique can efficiently detect and locate the tampering regions from the image with a high true positive rate, low false positive and negative rate. Additionally, the proposed technique exhibits an excellent ability to resist various intentional and unintentional attacks which makes it suitable for real-time applications.
引用
收藏
页码:3869 / 3881
页数:12
相关论文
共 50 条
  • [31] Wavelet-based semi-fragile watermarking with tamper detection
    Ding, K
    He, C
    Jiang, LG
    Wang, HX
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (03) : 787 - 790
  • [32] Fragile speech watermarking based on exponential scale quantization for tamper detection
    Wu, CP
    Kuo, CCJ
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3305 - 3308
  • [33] AN EFFICIENT BLOCK-BASED FRAGILE WATERMARKING SYSTEM FOR TAMPER LOCALIZATION AND RECOVERY
    Edupuganti, Venkata Gopal
    Shin, Frank Y.
    Chang, I-Cheng
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 257 - 267
  • [34] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Irshad Ahmad Ansari
    Millie Pant
    Chang Wook Ahn
    International Journal of Machine Learning and Cybernetics, 2016, 7 : 1225 - 1239
  • [35] A chaotic system based fragile watermarking scheme for image tamper detection
    Rawat, Sanjay
    Raman, Balasubramanian
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2011, 65 (10) : 840 - 847
  • [36] A Fragile Watermarking Algorithm for Image Tamper Detection Based on Chaotic Maps
    Lazarov, Nikodim
    Ilcheva, Zlatoliliya
    2016 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2016, : 723 - 728
  • [37] Image Tamper Detection Algorithm Based on Chaotic Theory and Fragile Watermarking
    Zhang, Qing
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 182 - 187
  • [38] A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images
    Manikandan, V. M.
    Masilamani, V.
    TENTH INDIAN CONFERENCE ON COMPUTER VISION, GRAPHICS AND IMAGE PROCESSING (ICVGIP 2016), 2016,
  • [39] Semi-fragile watermarking technique for image tamper localization
    Hao, Zhou
    Li, Haiyan
    Yu, Pengfei
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL I, 2009, : 519 - 523
  • [40] A novel fragile watermarking technique with high accuracy tamper localization
    Erturkler, Metin
    Tatar, Yetkin
    2006 IEEE 14TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1 AND 2, 2006, : 742 - +