Skip to main content
Log in

A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection

  • Research Paper
  • Published:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering Aims and scope Submit manuscript

Abstract

Integrity protection is one of the security mechanisms used to prevent the originality of the content from illegal manipulation. In this paper, the authors have proposed an efficient fragile watermarking scheme to localize the temper region in digital images. To ensure the image integrity, the watermark information insertion is realized into the cover image using a key matrix. A logistic map-based chaotic sequence is considered to produce both the key matrix and the watermark information. The proposed scheme is able to retain high visual quality watermarked image and can precisely detect the tampered region if the image undergoes any attack by various malicious tampering methods. The effectiveness of the proposed scheme is presented by performing various malicious tampering attacks on the watermarked images. Experimental results show that the proposed watermarking scheme has achieved the satisfactory performance. The proposed scheme gives better perceptual quality of watermarked image and low false tamper detection rates compared to some other related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig.8
Fig.9

Similar content being viewed by others

References

  • Artz D (2001) Digital steganography: hiding data within data. Internet Comput IEEE 5(3):75–80

    Article  Google Scholar 

  • Aslantas V, OzerS Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Commun 282(14):2806–2817

    Article  Google Scholar 

  • Botta M, Cavagnino D, Pomponiu V (2015) A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 69(1):242–245

    Article  Google Scholar 

  • Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  • Hartung F, Kutter M (1999) Multimedia watermarking techniques. 87:1079–1107

  • Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Optics Commun 283:1737–1743

    Article  Google Scholar 

  • Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34

    Article  Google Scholar 

  • Lambić D (2015) A new discrete chaotic map based on the composition of permutation. Chaos, Solitons Fractals 78:245–248

    Article  MathSciNet  MATH  Google Scholar 

  • Liu SH et al (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882

    MATH  Google Scholar 

  • Lu H, Shen R, Chung FL (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898–900

    Article  Google Scholar 

  • Munir R (2015) A chaos-based fragile watermarking method in spatial domain for image authentication. International Seminar on Intelligent Technology and Its Applications (ISITIA) 227–232

  • Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU Int J Electron Commun 70(8):1055–1061

    Article  Google Scholar 

  • Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 65(10):840–847

    Article  Google Scholar 

  • Sarabia MG, Márquez CR (2016) Generalized hamming weights and some parameterized codes. Discrete Math 339(2):813–821

    Article  MathSciNet  MATH  Google Scholar 

  • Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9):165–175

    Google Scholar 

  • Singh YS, Devi BP, Singh KM (2013) A review of different techniques on digital image watermarking scheme. Int J Eng Res 2(3):193–199

    Google Scholar 

  • Solorio SB, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739

    Article  MATH  Google Scholar 

  • Sridhar K et al (2014) Comparison of digital watermarking with other techniques of data hiding. (IJCSIT) Int J Comput Sci Inf Technol 5:350–353

    Google Scholar 

  • Stallings W (2010) Cryptography and network security, principles and practice, 5th edn. Prentice Hall, New York

    Google Scholar 

  • Tefas A, Nikolaidis N, Pitas I (2005) Watermarking techniques for image authentication and copyright protection. In: Bovik A (ed) Communications, networking and multimedia, handbook of image and video processing. Academic Press, Burlington, pp 1083–1109

  • Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  • Tsai MJ (2013) Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement. Multimedia Tools Appl 52:347–367

    Article  Google Scholar 

  • Wang B, Zhou S, Zheng X, Zhou C, Dong J, Zhao L (2015) Image watermarking using chaotic map and DNA coding. Optik Int J Light and Electron Optics 126(24):4846–4851

    Article  Google Scholar 

  • Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Optics Commun 285:2596–2606

    Article  Google Scholar 

  • Yeung M, Mintzer F (1998) Invisible watermarking for image verification. J Electron Imaging 7(3):578–591

    Article  Google Scholar 

  • Yu M et al (2015a) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370

    Article  Google Scholar 

  • Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015b) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370

    Article  Google Scholar 

  • Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89(4):675–679

    Article  MATH  Google Scholar 

  • Zhang J, Zhang Q, Hi Lv (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik Int J Light Electron Optics 124(23):6367–6371

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saswati Trivedy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Trivedy, S., Pal, A.K. A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iran J Sci Technol Trans Electr Eng 41, 103–113 (2017). https://doi.org/10.1007/s40998-017-0021-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40998-017-0021-9

Keywords

Navigation