A logistic map based blind and fragile watermarking for tamper detection and localization in images

被引:0
作者
Aditya Kumar Sahu
机构
[1] GMRIT,Department of Computer Science and Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2022年 / 13卷
关键词
Fragile watermarking; Logistic map; Tamper detection and localization; Least significant bit;
D O I
暂无
中图分类号
学科分类号
摘要
In real-time data transmission, the protection of multimedia content from unauthorized access is pivotal. In this context, digital watermarking techniques have drawn significant attention from the past few decades. However, most of the reported techniques fail to achieve a good balance among the perceptual transparency, embedding capacity (EC), and robustness. Besides, tamper detection and localization are the two crucial aspects of any authentication based watermarking technique. This paper proposes a logistic map based fragile watermarking technique to efficiently detect and localize the tampered regions from the watermarked image (WI). The proposed technique takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Next, these watermark bits are embedded in the rightmost least significant bits (LSBs) by performing the logical XOR operation between the first intermediate significant bits (ISBs) and the watermark bits. Simulation results show that the proposed technique can produce high quality WI with an average peak signal-to-noise ratio (PSNR) of 51.14 dB. Further, the proposed technique can efficiently detect and locate the tampering regions from the image with a high true positive rate, low false positive and negative rate. Additionally, the proposed technique exhibits an excellent ability to resist various intentional and unintentional attacks which makes it suitable for real-time applications.
引用
收藏
页码:3869 / 3881
页数:12
相关论文
共 97 条
[1]  
Ansari IA(2016)SVD based fragile watermarking scheme for tamper localization and self-recovery Int J Mach Learn Cybern 7 1225-1239
[2]  
Pant M(2018)On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching J King Saud Univ Comput Inf Sci 11 110-446
[3]  
Ahn CW(2020)Digital image watermarking techniques: a review Information 27 439-1470
[4]  
Bal SN(2006)A watermarking-based image ownership and tampering authentication scheme Pattern Recognit Lett 84 1462-1307
[5]  
Nayak MR(2011)A secure fragile watermarking scheme based on chaos-and-hamming code J Syst Softw 36 1300-56
[6]  
Sarkar SK(2009)A fuzzy c-means clustering-based fragile watermarking scheme for image authentication Expert Syst Appl 72 41-271
[7]  
Begum M(2014)Chaos-based self-embedding fragile watermarking with flexible watermark payload Multimed Tools Appl 10 263-17718
[8]  
Uddin MS(2014)A fragile watermarking algorithm for hologram authentication J Disp Technol 78 17701-1808
[9]  
Chang CC(2019)A novel hash function based fragile watermarking method for image integrity Multimed Tools Appl 11 1799-441
[10]  
Hu YS(2020)An efficient watermarking technique for tamper detection and localization of medical images J Ambient Intell Hum Comput 9 432-26