Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
نویسندگان
چکیده
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-based scheme that divides the cover image into non-overlapping 4×4 blocks. We generate an 8-bit authentication watermark for each cover image block based on the block contents and then we use the proposed chaos-based encryption algorithm to encrypt this watermark. These encrypted 8-bit watermark are then embedded into the least significant bits (LSBs) of the highest intensity eight pixels of the block. On the other hand, the second proposed watermarking scheme can be classified as a wavelet-based scheme which uses an external secret watermark. This watermark is encrypted using the proposed chaos-based encryption algorithm. We decompose the cover image using Discrete Wavelet Transform (DWT) and then we use the encrypted watermark to update the approximation coefficients (LL sub-band) of the
منابع مشابه
Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملDigital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication
Watermarking schemes for authentication purposes are characterized by three factors namely security, resolution of tamper localization, and embedding distortion. Since the requirements of high security, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, block-wise dependence is r...
متن کاملA Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication
This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication. In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant bit (LSB) of the host image. The proposed algorithm not only possesses excellent tamper loc...
متن کاملA Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization
In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. Then feature se...
متن کامل