A reversible two-level image authentication scheme based on chaotic fragile watermark

D. Xiao, Jian Jin
{"title":"A reversible two-level image authentication scheme based on chaotic fragile watermark","authors":"D. Xiao, Jian Jin","doi":"10.1109/CEWIT.2012.6606974","DOIUrl":null,"url":null,"abstract":"For image authentication, the capability of accurately locating tampered pixel and ensuring security is desirable. In this paper, we propose a novel reversible two-level image authentication scheme based on chaotic fragile watermark. In the embedding process, at the pixel level, by utilizing the pixel correlation technology, the location watermark of each pixel is generated and embedded to the LSB of the pixel itself firstly. At the image block level, the image is then partitioned into blocks, and the relation watermark of each block is computed and embedded into the top-left sub-block of its corresponding excursion block in a reversible way. The excursion block mapping sequence can be generated by sorting the keyed chaotic sequence. After all the relation watermarks are embedded, in each block embedded by relation watermark, the detection watermark is computed and embedded into the down-right subblock of the block itself in a reversible way. In the extracting process, the watermarked image is partitioned into blocks, then the embedded detection watermark of each block is extracted and the block itself is partially recovered for the first time. And the embedded relation watermark of each block is extracted and the block is fully recovered for the second time. Then we compute the new relation watermark and detection watermarks of each recovered block and perform comparison with the extracted ones. In the proposed scheme, the tampered watermark can pass the authentication because it does not reduce the value of image to some extent. But if the image content is tampered, the further step is taken at the pixel level to locate tamper to specific pixel by comparing the re-computed location watermark with the extracted location watermark. In the proposed image authentication scheme, the complicated nonlinear property of chaos is utilized to generate the pixel location watermark at the pixel level, construct the excursion block map, and create the relation watermark and detection watermark at the image block level. Theoretical analysis and computer simulation have verified the successful achievement of the proposed image authentication scheme.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEWIT.2012.6606974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

For image authentication, the capability of accurately locating tampered pixel and ensuring security is desirable. In this paper, we propose a novel reversible two-level image authentication scheme based on chaotic fragile watermark. In the embedding process, at the pixel level, by utilizing the pixel correlation technology, the location watermark of each pixel is generated and embedded to the LSB of the pixel itself firstly. At the image block level, the image is then partitioned into blocks, and the relation watermark of each block is computed and embedded into the top-left sub-block of its corresponding excursion block in a reversible way. The excursion block mapping sequence can be generated by sorting the keyed chaotic sequence. After all the relation watermarks are embedded, in each block embedded by relation watermark, the detection watermark is computed and embedded into the down-right subblock of the block itself in a reversible way. In the extracting process, the watermarked image is partitioned into blocks, then the embedded detection watermark of each block is extracted and the block itself is partially recovered for the first time. And the embedded relation watermark of each block is extracted and the block is fully recovered for the second time. Then we compute the new relation watermark and detection watermarks of each recovered block and perform comparison with the extracted ones. In the proposed scheme, the tampered watermark can pass the authentication because it does not reduce the value of image to some extent. But if the image content is tampered, the further step is taken at the pixel level to locate tamper to specific pixel by comparing the re-computed location watermark with the extracted location watermark. In the proposed image authentication scheme, the complicated nonlinear property of chaos is utilized to generate the pixel location watermark at the pixel level, construct the excursion block map, and create the relation watermark and detection watermark at the image block level. Theoretical analysis and computer simulation have verified the successful achievement of the proposed image authentication scheme.
一种基于混沌脆弱水印的可逆两级图像认证方案
对于图像认证,需要能够准确定位篡改像素并保证安全性。本文提出了一种新的基于混沌脆弱水印的可逆两级图像认证方案。在嵌入过程中,在像素级,利用像素相关技术,首先生成每个像素的位置水印,并将其嵌入到像素本身的LSB中。在图像块级,将图像分割成块,计算每个块的关系水印,并以可逆的方式嵌入到其相应偏移块的左上角子块中。通过对键控混沌序列进行排序,生成偏移块映射序列。在所有关系水印嵌入后,在每个被关系水印嵌入的块中计算检测水印,并以可逆的方式嵌入到块本身的向下子块中。在提取过程中,先将水印图像分割成若干块,然后提取每个块的嵌入检测水印,第一次对块本身进行部分恢复。提取每个块的嵌入关系水印,对块进行第二次完全恢复。然后计算每个恢复块的新的关系水印和检测水印,并与提取的水印进行比较。在该方案中,篡改后的水印不会在一定程度上降低图像的价值,因此可以通过认证。但是,如果图像内容被篡改,则通过将重新计算的位置水印与提取的位置水印进行比较,在像素级进一步将篡改者定位到特定像素。在该图像认证方案中,利用混沌的复杂非线性特性在像素级生成像素位置水印,构造偏移块映射,在图像块级生成关系水印和检测水印。理论分析和计算机仿真验证了所提图像认证方案的成功实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信