A Fragile Watermarking Scheme for Authentication of GIF Images

نویسنده

  • Rinaldi Munir
چکیده

Fragile image watermarking could be used to authenticate a digital image due to modification or altering. A watermark is embedded into the image. When the image was modified or altered, the watermark is also altered or fragile. One of popular image format is GIF image. Some fragile watermarking algorithms are applied to the single GIF image only, none for animated images. However, we could modify the existing steganography algorithm to build a fragile watermarking scheme for any kind of GIF images (still images or animated images). In this paper, we reused EzStego to embed a watermark into the GIF images. EzStego is a steganography algorithm especially for hiding the message in the palette images such as the GIF images. The watermark, which is a binary image, is inserted into a GIF image based on EzStego embeddeing scheme. For increasing security, the watermark is encrypted with the random bits based on chaos system before embedding. To prove authentication of the image, the watermark is extracted from the watermarked image based on EzStego extraction scheme and then compare it with the original watermark. The fragile watermark indicates that the image has been altered. We also could find parts of the image that has been altered. We have tested the performance of the proposed scheme by doing some typical attacks to the watermarked images. Based on experiments results we conclude that the watermarking scheme can detect the authentication of the watermarked images due to the attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fragile Watermarking Scheme for Color Image Authentication

In this paper, a fragile watermarking scheme is proposed for color image specified object’s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-over...

متن کامل

A Fragile Watermarking Scheme for Color Image Authentication

this paper, a fragile watermarking scheme is proposed for color image specified object's authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image and YS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overla...

متن کامل

FRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION

Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...

متن کامل

Fragile Watermarking using Chaotic Sequences

In this article we propose a new fragile watermarking algorithm that provides the means to verify the integrity of JPEG images. We begin by presenting the cryptanalysis of CWSA (Chaotic Watermarking Scheme for the Authentication of JPEG Images), an existing fragile watermarking algorithm. We analyse its weaknesses and we propose a new version that is resistant to those attacks, faster and less ...

متن کامل

Lossless data embedding with file size preservation

In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lossless watermarks found applications in fragile authentication, integrity protection, and metadata embedding. It is especially important for medical and military images. Frequently, lossless embedding disproportionably...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017