A Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark
نویسندگان
چکیده
Although a variety of watermark-based image authentication schemes have been proposed so far, most of them have to leave some permanent distortions in the original image for embedding the watermark information. In this paper, we propose a novel reversible image authentication scheme to allow complete recovery of the cover image after the extraction of the embedded watermark. In the embedding process, the original image is partitioned into blocks; the chaotic watermark of each block is computed and embedded into the block itself in a reversible way. In the extracting process, the watermarked image is partitioned into blocks; the embedded watermark of each block is extracted and the block itself is fully recovered. Then we compute the new chaotic watermark of each recovered block and perform comparison with the extracted one. Therefore, we can detect whether the original image is modified. If it is, then the modification can be located. Besides, by the use of chaotic watermark, the complicated nonlinear and sensitive dependence within image feature, secret key, and watermark is established to ensure the watermarking security. Theoretical analysis and computer simulation have verified the successful achievement of the proposed image authentication scheme.
منابع مشابه
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...
متن کاملAn image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has been tampered, and distinguish tampered areas from non-tampered areas without referring to the original digital content. In this paper, a general framework for fragile watermark is proposed, and then a novel fragile w...
متن کاملA Fragile Watermarking Scheme for Authentication of GIF Images
Fragile image watermarking could be used to authenticate a digital image due to modification or altering. A watermark is embedded into the image. When the image was modified or altered, the watermark is also altered or fragile. One of popular image format is GIF image. Some fragile watermarking algorithms are applied to the single GIF image only, none for animated images. However, we could modi...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملTwo-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the water...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010