Robust watermarking scheme for tamper detection and authentication exploiting CA

被引:9
作者
Pal, Pabitra [1 ]
Jana, Biswapati [1 ]
Bhaumik, Jaydeb [2 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, West Midnapore 721102, India
[2] Jadavpur Univ, Dept ETCE, Kolkata 700032, India
关键词
interpolation; image watermarking; image coding; cellular automata; industrial property; message authentication; cryptography; watermarking; robust watermarking scheme; tamper detection; one-dimensional cellular automata; research issues; large-scale integration; enhanced security; special type; periodic boundary CA; CA attractor; image authentication; simple tools; low hardware complexity; authentication code; AC; utilising secure hash algorithm-512; watermark image; cover image; CI; interpolated image; secret watermark bits; quality; secret watermark information; watermarked images; similar schemes; commercial security; REVERSIBLE WATERMARKING; IMAGE; REGION;
D O I
10.1049/iet-ipr.2018.6638
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, the authors have employed a special type of periodic boundary CA (called CA attractor) for image authentication and tamper detection through the watermarking scheme. Authentication code (AC) has been generated utilising secure hash algorithm-512 on watermark image. The cover image (CI) is subdivided into four sub-sampled interpolated image, where AC and secret watermark bits are embedded to enhance capacity, quality and security. At the receiver end, the secret watermark information and CI are successfully extracted without any distortion from four sub-sampled watermarked images (WIs). Additionally, the proposed scheme can successfully determine any type of distortion within the WI that may be possible to occur by various steganographic attacks. Indeed, better results in terms of capacity and quality are experienced after having compared with similar schemes in vogue. The intended outcome brought into the limelight some remarkable sublime characteristics in the field of image authentication and ownership identification without which the technology life is stunted. Innumerable government and private sector facet including health care, commercial security, defence and intellectual property rights are immensely benefited from this scheme.
引用
收藏
页码:2116 / 2129
页数:14
相关论文
共 27 条
[1]  
Ahmed M., 2017, INT C ADV INT SYST I, P832
[2]   Effective Image Encryption Technique Through 2D Cellular Automata [J].
Bhardwaj, Rupali ;
Sharma, Vaishalli .
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 1, 2018, 518 :39-46
[3]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[4]   Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest [J].
Eswaraiah, Rayachoti ;
Reddy, Edara Sreenivasa .
IET IMAGE PROCESSING, 2015, 9 (08) :615-625
[5]   Reversible and high-capacity data hiding in medical images [J].
Fallahpour, M. ;
Megias, D. ;
Ghanbari, M. .
IET IMAGE PROCESSING, 2011, 5 (02) :190-197
[6]  
Funt B., HDR DATASET COMPUTAT
[7]   High payload reversible data hiding scheme using weighted matrix [J].
Jana, Biswapati .
OPTIK, 2016, 127 (06) :3347-3358
[8]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[9]   Invertible secret image sharing with steganography [J].
Lin, Pei-Yu ;
Chan, Chi-Shiang .
PATTERN RECOGNITION LETTERS, 2010, 31 (13) :1887-1893
[10]   Rotation, scaling, and translation resilient watermarking for images [J].
Lin, Y. -T. ;
Huang, C. -Y. ;
Lee, G. C. .
IET IMAGE PROCESSING, 2011, 5 (04) :328-340