Logistic-map based fragile image watermarking scheme for tamper detection and localization

被引:0
作者
Aditya Kumar Sahu
M. Hassaballah
Routhu Srinivasa Rao
Gulivindala Suresh
机构
[1] Amrita Vishwa Vidyapeetham,Amrita School of Computing, Amaravati Campus
[2] Prince Sattam Bin Abdulaziz University,Department of Computer Science, College of Computer Engineering and Science
[3] South Valley University,Department of Computer Science, Faculty of Computers and Information
[4] GITAM School of Technology,Department of CSE
[5] GITAM (Deemed to be University),Department of ECE
[6] Aditya Engineering College,undefined
来源
Multimedia Tools and Applications | 2023年 / 82卷
关键词
Fragile watermarking; Logistic-map; Tampered detection and localization; Accuracy;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, two logistic-map based fragile image watermarking schemes are proposed. The first scheme is a conventional irreversible, whereas the second scheme is a reversible one. The proposed first scheme considers a pair of two consecutive host image (HI) pixels for embedding the watermark bits. At the embedding end, each HI pixel observes a maximum of ±1 modifications to produce the watermarked pixels. At the same time, the second scheme utilizes the concept of mirrored images of the HI to reproduce the image as well as the watermark bits, with minimal distortion. The experimental results show that the quality of the watermarked image is superior with an average peak signal-to-noise ratio (PSNR) of more than 51 dB for both schemes. Also, the first scheme offers excellent tamper detection and localization ability as compared to the existing state-of-art schemes. Besides, promising results are obtained in favor of the proposed scheme for measures like accuracy, true positive (TP), true negative (TN), false positive (FP), false negative (FN), and precision.
引用
收藏
页码:24069 / 24100
页数:31
相关论文
共 50 条
[21]   A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy [J].
Prasad, Shiv ;
Pal, Arup Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (3-4) :1673-1705
[22]   A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy [J].
Shiv Prasad ;
Arup Kumar Pal .
Multimedia Tools and Applications, 2020, 79 :1673-1705
[23]   A Fragile Watermarking Algorithm for Image Tamper Detection Based on Chaotic Maps [J].
Lazarov, Nikodim ;
Ilcheva, Zlatoliliya .
2016 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2016, :723-728
[24]   A Triple Self-Embedding Fragile Watermarking Scheme for Image Tamper Detection and Recovery [J].
Ozkaya, Huseyin ;
Aslantas, Veysel .
IEEE ACCESS, 2024, 12 :140082-140096
[25]   A secure image watermarking for tamper detection and localization [J].
Bhalerao, Siddharth ;
Ansari, Irshad Ahmad ;
Kumar, Anil .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :1057-1068
[26]   A block-based fragile watermarking scheme for digital image authentication and tamper recovery [J].
Swain M. ;
Swain D. .
International Journal of Reasoning-based Intelligent Systems, 2024, 16 (01) :1-7
[27]   Hash-based image watermarking technique for tamper detection and localization [J].
Hussan, Muzamil ;
Parah, Shabir A. ;
Jan, Aiman ;
Qureshi, G. J. .
HEALTH AND TECHNOLOGY, 2022, 12 (02) :385-400
[28]   Image Fragile Watermarking with Two Authentication Components for Tamper Detection and Recovery [J].
Rakhmawati, Lusia ;
Wirawan ;
Suwadi .
2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AUTONOMOUS SYSTEMS (ICOIAS), 2018, :35-38
[29]   A secure hierarchical fragile watermarking method with tamper localization [J].
Zhang, Xianhai ;
Yang, Yongtian ;
Zhu, Yan .
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, :69-+
[30]   Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet [J].
Azeroual, Assma ;
Afdel, Karim .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 79 :207-218