A logistic map based blind and fragile watermarking for tamper detection and localization in images

被引:40
作者
Sahu, Aditya Kumar [1 ]
机构
[1] GMRIT, Dept Comp Sci & Engn, Rajam 532127, Andhra Pradesh, India
关键词
Fragile watermarking; Logistic map; Tamper detection and localization; Least significant bit; AUTHENTICATION; SCHEME; ALGORITHM;
D O I
10.1007/s12652-021-03365-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In real-time data transmission, the protection of multimedia content from unauthorized access is pivotal. In this context, digital watermarking techniques have drawn significant attention from the past few decades. However, most of the reported techniques fail to achieve a good balance among the perceptual transparency, embedding capacity (EC), and robustness. Besides, tamper detection and localization are the two crucial aspects of any authentication based watermarking technique. This paper proposes a logistic map based fragile watermarking technique to efficiently detect and localize the tampered regions from the watermarked image (WI). The proposed technique takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Next, these watermark bits are embedded in the rightmost least significant bits (LSBs) by performing the logical XOR operation between the first intermediate significant bits (ISBs) and the watermark bits. Simulation results show that the proposed technique can produce high quality WI with an average peak signal-to-noise ratio (PSNR) of 51.14 dB. Further, the proposed technique can efficiently detect and locate the tampering regions from the image with a high true positive rate, low false positive and negative rate. Additionally, the proposed technique exhibits an excellent ability to resist various intentional and unintentional attacks which makes it suitable for real-time applications.
引用
收藏
页码:3869 / 3881
页数:13
相关论文
共 34 条
  • [1] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1225 - 1239
  • [2] On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching
    Bal, Sanjeev Narayan
    Nayak, Manas Ranjan
    Sarkar, Subir Kumar
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 552 - 561
  • [3] Digital Image Watermarking Techniques: A Review
    Begum, Mahbuba
    Uddin, Mohammad Shorif
    [J]. INFORMATION, 2020, 11 (02)
  • [4] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [5] A secure fragile watermarking scheme based on chaos-and-hamming code
    Chang, Chin-Chen
    Chen, Kuo-Nan
    Lee, Chin-Feng
    Liu, Li-Jen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1462 - 1470
  • [6] An adaptive and fragile image watermarking algorithm based on composite chaotic iterative dynamic system
    Che, Shengbing
    Ma, Bin
    Che, Zuguo
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 159 - 162
  • [7] Chaos-based self-embedding fragile watermarking with flexible watermark payload
    Chen, Fan
    He, Hongjie
    Tai, Heng-Ming
    Wang, Hongxia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) : 41 - 56
  • [8] A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
    Chen, Wei-Che
    Wang, Ming-Shi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) : 1300 - 1307
  • [9] A Fragile Watermarking Algorithm for Hologram Authentication
    Cheng, Chau-Jern
    Hwang, Wen-Jyi
    Zeng, Han-Yi
    Lin, Yu-Chih
    [J]. JOURNAL OF DISPLAY TECHNOLOGY, 2014, 10 (04): : 263 - 271
  • [10] A novel hash function based fragile watermarking method for image integrity
    Gul, Ertugrul
    Ozturk, Serkan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 17701 - 17718