A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection

被引:17
作者
Chen, Young-Long [1 ]
Yau, Her-Terng [2 ]
Yang, Guo-Jheng [1 ]
机构
[1] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Elect Engn, Taichung 41170, Taiwan
关键词
encrypt; watermark; logistic map; Arnold's cat map; AUTHENTICATION;
D O I
10.3390/e15083260
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because all of the media on the Internet are digital, protection has become a critical issue, and determining how to use digital watermarks to protect digital media is thus the topic of our research. This paper uses the Logistic map with parameter u = 4 to generate chaotic dynamic behavior with the maximum entropy 1. This approach increases the security and rigor of the protection. The main research target of information hiding is determining how to hide confidential data so that the naked eye cannot see the difference. Next, we introduce one method of information hiding. Generally speaking, if the image only goes through Arnold's cat map and the Logistic map, it seems to lack sufficient security. Therefore, our emphasis is on controlling Arnold's cat map and the initial value of the chaos system to undergo small changes and generate different chaos sequences. Thus, the current time is used to not only make encryption more stringent but also to enhance the security of the digital media.
引用
收藏
页码:3170 / 3185
页数:16
相关论文
共 26 条
[1]  
Abhayaratne C., 2011, J REAL-TIME IMAGE PR, V6, P1
[2]  
Cavalcante HLDS, 2001, PHYSICA A, V295, P291, DOI 10.1016/S0378-4371(01)00090-5
[3]   A secure fragile watermarking scheme based on chaos-and-hamming code [J].
Chang, Chin-Chen ;
Chen, Kuo-Nan ;
Lee, Chin-Feng ;
Liu, Li-Jen .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) :1462-1470
[4]   A result regarding convergence of random logistic maps [J].
Dai, JJ .
STATISTICS & PROBABILITY LETTERS, 2000, 47 (01) :11-14
[5]   Chaotic noise MOS generator based on logistic map [J].
Diaz-Mendez, A. ;
Marquina-Perez, J. V. ;
Cruz-Irisson, M. ;
Vazquez-Medina, R. ;
Del-Rio-Correa, J. L. .
MICROELECTRONICS JOURNAL, 2009, 40 (03) :638-640
[6]  
Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274
[7]  
Fridrich J, 2000, IEEE IMAGE PROC, P446, DOI 10.1109/ICIP.2000.900991
[8]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[9]  
Fridrich J, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P404, DOI 10.1109/ICIP.1998.723401
[10]  
Guyeux C., 2010, P 2010 INT C SEC CRY, P1