Advertisement

Tamper Detection Using Fragile Image Watermarking Based on Chaotic System

  • Mariya Fatema
  • Vikas Maheshkar
  • Sushila Maheshkar
  • Gaurav Agarwal
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 18)

Abstract

Development in computer networks and digital technology provides ease of distribution and wide availability of digital images but also facilitate illegal copying and malicious tampering. In this paper, we propose a novel chaos-based watermarking scheme for image authentication and tamper localization and detection. In the proposed scheme, watermark is embedded in spatial domain using LSB technique. LSB techniques are used to improve the robustness. Two chaotic maps, i.e., Arnold transform and logistic maps, are used to enhance the security of fragile watermarking; these are sensitive to initial condition and used as secret key. Least significant methods are used to embed the watermark information to improve the imperceptibility of watermarked image. Experimental results show that the proposed scheme is secure. It localizes and detects tampering with high accuracy under different types of tampering.

Keywords

Fragile Watermarking Chaotic Maps Least Significant Bit Tamper Detection Authentication 

References

  1. 1.
    E.T. Lin, E.J. Delp. A review of fragile image watermarks, in Proceedings of the Multimedia and Security Workshop (ACM Multimedia’99) Multimedia Contents, 1999Google Scholar
  2. 2.
    N. Lazarov, Z. Ilcheva, A fragile watermarking algorithm for image tamper detection based on chaotic maps. Intelligent Systems (IS), 2016 IEEE 8th International Conference on. IEEE, 4–6 September 2016Google Scholar
  3. 3.
    M. Iwata, et al., Digital watermarking method for tamper detection and recovery of JPEG images. Information Theory and Its Applications (ISITA), 2010 International Symposium on. IEEE, March 2010Google Scholar
  4. 4.
    Md. Moniruzzaman, Md.A.K. Hawlader, Md.F. Hossain. An image fragile watermarking scheme based on chaotic system for image tamper detection. Informatics, Electronics & Vision (ICIEV), 2014 International Conference on. IEEE 2014Google Scholar
  5. 5.
    M. Botta, D. Cavagnino, V. Pomponiu, X. Tong, et al., A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28(3), 301–308 (2013)CrossRefGoogle Scholar
  6. 6.
    J. Fridrich, Security of fragile authentication watermarks with localization. Electron. Imaging 2002 Int. Soc. Optics Photonics 4675, 691–701 (2002)CrossRefGoogle Scholar
  7. 7.
    S. Zhu, J. Liu, A novel fragile watermarking scheme for image tamper detection and recovery. Chin. Opt. Lett. 8(7), 661–665 (2010)CrossRefGoogle Scholar
  8. 8.
    S. Rawat, B. Raman, A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. Electron. Commun. 65(10), 840–847 (2011)CrossRefGoogle Scholar
  9. 9.
    M. Botta, D. Cavagnino, V. Pomoniu, A succecfull attack and revison of chaotic system base fragile watermarking scheme for tamper dectection. AEU Int. J. Electron. Commun. 69(1), 242–245 (2015)CrossRefGoogle Scholar
  10. 10.
    L. Teng, Cryptanalysis and improvement of a chaotic based fragile watermarking scheme. AEU Int. J. Electron. Commun. 67(6), 540–547 (2015)CrossRefGoogle Scholar
  11. 11.
    X. Tong, A noval chaos- based fragile watermarking scheme fir image tamper detection and self-recovery. Signal Process. Image Commun. 28(3), 301–308 (2013)CrossRefGoogle Scholar
  12. 12.
    D. Caragata, J.A. Mucarquer, M. Koscina, S. El Assad, Cryptanalysis of an improved fragile watermarking scheme. AEU-Int. J. Electron. Commun. 70(6), 777–785 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Mariya Fatema
    • 1
  • Vikas Maheshkar
    • 2
  • Sushila Maheshkar
    • 1
  • Gaurav Agarwal
    • 1
  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology (ISM)DhanbadIndia
  2. 2.Division of Information TechnologyNetaji Subhas Institute of TechnologyDwarkaIndia

Personalised recommendations