AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models

被引:5
作者
Daoui, Achraf [1 ]
Yamni, Mohamed [2 ]
Altameem, Torki [3 ]
Ahmad, Musheer [4 ]
Hammad, Mohamed [5 ]
Plawiak, Pawel [6 ,7 ]
Tadeusiewicz, Ryszard [8 ]
Abd El-Latif, Ahmed A. [9 ,10 ]
机构
[1] Sidi Mohamed Ben Abdellah Univ, Natl Sch Appl Sci, Fes 30000, Morocco
[2] Sidi Mohamed Ben Abdellah Univ, Dhar Mahrez Fac Sci, Fes 30000, Morocco
[3] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11451, Saudi Arabia
[4] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[5] Menoufia Univ, Fac Comp & Informat, Dept Informat Technol, Shibin Al Kawm 32511, Egypt
[6] Cracow Univ Technol, Fac Comp Sci & Telecommun, Dept Comp Sci, Warszawska 24, PL-31155 Krakow, Poland
[7] Polish Acad Sci, Inst Theoret & Appl Informat, Bałtycka 5, PL-44100 Gliwice, Poland
[8] AGH Univ Sci & Technol, Dept Biocybernet & Biomed Engn, PL-30059 Krakow, Poland
[9] Harbin Inst Technol, Informat Countermeauser Tech Inst, Fac Comp, Sch Cyberspace Sci, Harbin 150001, Peoples R China
[10] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm 32511, Egypt
关键词
hyperchaotic systems; fragile watermarking; deep learning models; tamper detection; self-recovery; color image authentication; IMAGE TAMPER DETECTION; FRAGILE WATERMARKING; DUAL WATERMARKING; FRAMEWORK; LOCALIZATION; ALGORITHM; NETWORK; SCHEME;
D O I
10.3390/s23218957
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Color face images are often transmitted over public channels, where they are vulnerable to tampering attacks. To address this problem, the present paper introduces a novel scheme called Authentication and Color Face Self-Recovery (AuCFSR) for ensuring the authenticity of color face images and recovering the tampered areas in these images. AuCFSR uses a new two-dimensional hyperchaotic system called two-dimensional modular sine-cosine map (2D MSCM) to embed authentication and recovery data into the least significant bits of color image pixels. This produces high-quality output images with high security level. When tampered color face image is detected, AuCFSR executes two deep learning models: the CodeFormer model to enhance the visual quality of the recovered color face image and the DeOldify model to improve the colorization of this image. Experimental results demonstrate that AuCFSR outperforms recent similar schemes in tamper detection accuracy, security level, and visual quality of the recovered images.
引用
收藏
页数:35
相关论文
共 49 条
[1]   Secure and effective color image tampering detection and self restoration using a dual watermarking approach? [J].
Al-Otum, Hazem Munawer ;
Ellubani, Arwa Abdelnaser Ali .
OPTIK, 2022, 262
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]   AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation [J].
Aminuddin, A. ;
Ernawan, F. .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
[4]   AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking [J].
Aminuddin, Afrig ;
Ernawan, Ferda .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) :5822-5840
[5]  
[Anonymous], 70,000 Real Faces, P2
[6]   Image Watermarking Scheme Using LSB and Image Gradient [J].
Bin Faheem, Zaid ;
Ali, Mubashir ;
Raza, Muhammad Ahsan ;
Arslan, Farrukh ;
Ali, Jehad ;
Masud, Mehedi ;
Shorfuzzaman, Mohammad .
APPLIED SCIENCES-BASEL, 2022, 12 (09)
[7]   Terahertz Technologies to Deliver Optical Network Quality of Experience in Wireless Systems Beyond 5G [J].
Boulogeorgos, Alexandros-Apostolos A. ;
Alexiou, Angeliki ;
Merkle, Thomas ;
Schubert, Colja ;
Elschner, Robert ;
Katsiotis, Alexandros ;
Stavrianos, Panagiotis ;
Kritharidis, Dimitrios ;
Chartsias, Panteleimon-Konstantinos ;
Kokkoniemi, Joonas ;
Juntti, Markku ;
Lehtomaki, Janne ;
Teixeira, Antonio ;
Rodrigues, Francisco .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (06) :144-151
[8]   Hierarchical recovery for tampered images based on watermark self-embedding [J].
Cao, Fang ;
An, Bowen ;
Wang, Jinwei ;
Ye, Dengpan ;
Wang, Huili .
DISPLAYS, 2017, 46 :52-60
[9]   A new 4D hyperchaotic system with high complexity [J].
Chen, Lijuan ;
Tang, Song ;
Li, Qingdu ;
Zhong, Shouming .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2018, 146 :44-56
[10]   An Evaluation of Popular Copy-Move Forgery Detection Approaches [J].
Christlein, Vincent ;
Riess, Christian ;
Jordan, Johannes ;
Riess, Corinna ;
Angelopoulou, Elli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1841-1854