An improved method for digital image fragile watermarking based on chaotic maps

被引:31
作者
Nazari, Mahboubeh [1 ]
Sharif, Amir [2 ]
Mollaeefar, Majid [2 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Math, Mashhad, Iran
[2] Imam Reza Int Univ, Dept Comp & Informat Technol, Mashhad, Iran
关键词
Fragile watermarking; Chaos; Tempering localization; Image security; SCHEME; AUTHENTICATION; COMPRESSION;
D O I
10.1007/s11042-016-3897-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce watermark payloads, while they have high quality of recovery and security. In watermark embedding phase, we process the image in order to produce the information array for each block, which finally embedded in the host image to build watermarked image. The information array for each block has different length, which is defined based on block characteristic that could be smooth or rough. The second superiority of the proposed method is proposing a new metric for calculating roughness of image block, which leads to less consume of bandwidth in comparison with other available methods. Finally, we use chaotic map for block-mapping that enhances the security. Our method provides basic requirements of watermarking scheme such as, invisibility, recover quality and security. Experimental Results have proved that our method is powerful in tamper detection, self-recovery and robust against known watermarking attacks.
引用
收藏
页码:16107 / 16123
页数:17
相关论文
共 29 条
[1]  
[Anonymous], MULTIMEDIA TOOLS APP
[2]  
[Anonymous], MULTIMEDIA TOOLS APP
[3]  
[Anonymous], MULTIMEDIA TOOLS APP
[4]  
[Anonymous], S CONT SEC DAT HID D
[5]   Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF SUPERCOMPUTING, 2015, 71 (08) :3163-3180
[6]   On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Teymoori, Vahid ;
Nikooghadam, Morteza ;
Abbassi, Hassan .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
[7]   Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
[8]   Image forgery detection in contourlet transform domain based on new chaotic cellular automata [J].
Barani, Milad Jafari ;
Ayubi, Peyman ;
Jalili, Fooad ;
Valandar, Milad Yousefi ;
Azariyun, Ehsan .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4343-4361
[9]   Color Image Analysis by Quaternion-Type Moments [J].
Chen, Beijing ;
Shu, Huazhong ;
Coatrieux, Gouenou ;
Chen, Gang ;
Sun, Xingming ;
Coatrieux, Jean Louis .
JOURNAL OF MATHEMATICAL IMAGING AND VISION, 2015, 51 (01) :124-144
[10]   Chaos-based self-embedding fragile watermarking with flexible watermark payload [J].
Chen, Fan ;
He, Hongjie ;
Tai, Heng-Ming ;
Wang, Hongxia .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) :41-56