Abstract
Integrity protection is one of the security mechanisms used to prevent the originality of the content from illegal manipulation. In this paper, the authors have proposed an efficient fragile watermarking scheme to localize the temper region in digital images. To ensure the image integrity, the watermark information insertion is realized into the cover image using a key matrix. A logistic map-based chaotic sequence is considered to produce both the key matrix and the watermark information. The proposed scheme is able to retain high visual quality watermarked image and can precisely detect the tampered region if the image undergoes any attack by various malicious tampering methods. The effectiveness of the proposed scheme is presented by performing various malicious tampering attacks on the watermarked images. Experimental results show that the proposed watermarking scheme has achieved the satisfactory performance. The proposed scheme gives better perceptual quality of watermarked image and low false tamper detection rates compared to some other related schemes.
Similar content being viewed by others
References
Artz D (2001) Digital steganography: hiding data within data. Internet Comput IEEE 5(3):75–80
Aslantas V, OzerS Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Commun 282(14):2806–2817
Botta M, Cavagnino D, Pomponiu V (2015) A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 69(1):242–245
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Hartung F, Kutter M (1999) Multimedia watermarking techniques. 87:1079–1107
Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Optics Commun 283:1737–1743
Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34
Lambić D (2015) A new discrete chaotic map based on the composition of permutation. Chaos, Solitons Fractals 78:245–248
Liu SH et al (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882
Lu H, Shen R, Chung FL (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898–900
Munir R (2015) A chaos-based fragile watermarking method in spatial domain for image authentication. International Seminar on Intelligent Technology and Its Applications (ISITIA) 227–232
Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU Int J Electron Commun 70(8):1055–1061
Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 65(10):840–847
Sarabia MG, Márquez CR (2016) Generalized hamming weights and some parameterized codes. Discrete Math 339(2):813–821
Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9):165–175
Singh YS, Devi BP, Singh KM (2013) A review of different techniques on digital image watermarking scheme. Int J Eng Res 2(3):193–199
Solorio SB, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739
Sridhar K et al (2014) Comparison of digital watermarking with other techniques of data hiding. (IJCSIT) Int J Comput Sci Inf Technol 5:350–353
Stallings W (2010) Cryptography and network security, principles and practice, 5th edn. Prentice Hall, New York
Tefas A, Nikolaidis N, Pitas I (2005) Watermarking techniques for image authentication and copyright protection. In: Bovik A (ed) Communications, networking and multimedia, handbook of image and video processing. Academic Press, Burlington, pp 1083–1109
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308
Tsai MJ (2013) Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement. Multimedia Tools Appl 52:347–367
Wang B, Zhou S, Zheng X, Zhou C, Dong J, Zhao L (2015) Image watermarking using chaotic map and DNA coding. Optik Int J Light and Electron Optics 126(24):4846–4851
Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Optics Commun 285:2596–2606
Yeung M, Mintzer F (1998) Invisible watermarking for image verification. J Electron Imaging 7(3):578–591
Yu M et al (2015a) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370
Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015b) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370
Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89(4):675–679
Zhang J, Zhang Q, Hi Lv (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik Int J Light Electron Optics 124(23):6367–6371
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Trivedy, S., Pal, A.K. A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iran J Sci Technol Trans Electr Eng 41, 103–113 (2017). https://doi.org/10.1007/s40998-017-0021-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40998-017-0021-9