{"title":"A secure watermark embedding approach based on chaotic map for image tamper detection","authors":"M. Barani, Milad Yousefi Valandar, P. Ayubi","doi":"10.1109/IKT.2015.7288809","DOIUrl":null,"url":null,"abstract":"Authentication is an important concept in transferring data such as images, videos and etc. In this paper, a new authentication method based on watermark embedding is proposed which makes us able to detect and localize forged areas in the image. In this method, picture is divided into 2 × 2 blocks and it permuted with a chaotic map and placed into an array, which this array is combined with sequence that generated by Jacobian elliptic map with XOR. Obtained authentication sequence is inserted directly into least significant bits of each pixel in cover image because Inserting data in spatial domain increases image visual quality and using chaotic map in embedding process increase security of proposed algorithm. Results of implementation and testing the proposed technique shows good visual quality and power of localizing tampered areas.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th Conference on Information and Knowledge Technology (IKT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IKT.2015.7288809","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Authentication is an important concept in transferring data such as images, videos and etc. In this paper, a new authentication method based on watermark embedding is proposed which makes us able to detect and localize forged areas in the image. In this method, picture is divided into 2 × 2 blocks and it permuted with a chaotic map and placed into an array, which this array is combined with sequence that generated by Jacobian elliptic map with XOR. Obtained authentication sequence is inserted directly into least significant bits of each pixel in cover image because Inserting data in spatial domain increases image visual quality and using chaotic map in embedding process increase security of proposed algorithm. Results of implementation and testing the proposed technique shows good visual quality and power of localizing tampered areas.