{"title":"A chaos-based fragile watermarking method in spatial domain for image authentication","authors":"R. Munir","doi":"10.1109/ISITIA.2015.7219983","DOIUrl":null,"url":null,"abstract":"In this paper, a fragile watermarking method based on chaos map for image authentication is proposed. The watermark is a binary logo of the same size with the host image. Before embedding, the watermark is encrypted by XOR-ing it with a chaotic image. The chaotic image is generated by using Logistic Map. Next, the least significant bits (LSB) of pixels is used for embedding where the LSB's of the host image are replaced by the encrypted watermark. Authentication is done by extracting the watermark from the watermarked image and then compare it with the original watermark. If found the extracted watermark fragile then it indicates that the image has been altered. Various typical attacks to the watermarked images are carried out to assess the performance of the proposed method. Experiment results show that the proposed method can detect image integrity due to the attacks. For increasing security, the chaos system give sensitivity aspect so that the method is secure from the exhaustive attack.","PeriodicalId":124449,"journal":{"name":"2015 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Seminar on Intelligent Technology and Its Applications (ISITIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITIA.2015.7219983","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
In this paper, a fragile watermarking method based on chaos map for image authentication is proposed. The watermark is a binary logo of the same size with the host image. Before embedding, the watermark is encrypted by XOR-ing it with a chaotic image. The chaotic image is generated by using Logistic Map. Next, the least significant bits (LSB) of pixels is used for embedding where the LSB's of the host image are replaced by the encrypted watermark. Authentication is done by extracting the watermark from the watermarked image and then compare it with the original watermark. If found the extracted watermark fragile then it indicates that the image has been altered. Various typical attacks to the watermarked images are carried out to assess the performance of the proposed method. Experiment results show that the proposed method can detect image integrity due to the attacks. For increasing security, the chaos system give sensitivity aspect so that the method is secure from the exhaustive attack.