Efficient fragile watermarking for image tampering detection using adaptive matrix on chaotic sequencing

Prajanto Wahyu Adi , Aris Sugiharto , Muhammad Malik Hakim , De Rosal Ignatius Moses Setiadi , Edy Winarno
{"title":"Efficient fragile watermarking for image tampering detection using adaptive matrix on chaotic sequencing","authors":"Prajanto Wahyu Adi ,&nbsp;Aris Sugiharto ,&nbsp;Muhammad Malik Hakim ,&nbsp;De Rosal Ignatius Moses Setiadi ,&nbsp;Edy Winarno","doi":"10.1016/j.iswa.2025.200530","DOIUrl":null,"url":null,"abstract":"<div><div>This paper introduces a novel fragile watermarking technique for image forgery detection using adaptive matrices derived from Walsh and Hadamard transforms. The proposed method overcomes the limitations of traditional SVD, Hadamard, and Walsh methods by eliminating negative coefficients, simplifying the algorithm structure, and optimizing the computational complexity. The embedding process uses a two-stage authentication mechanism with a 16-bit validation scheme, ensuring precise forgery localization. This adaptive approach is intelligently designed to adapt the matrix pattern to the image characteristics. At the same time, the utilization of logistic sequencing enables the generation of non-periodic and non-convergent patterns, which significantly improves authentication efficiency and accuracy. Performance evaluation shows an average PSNR value of 55.90 dB and SSIM above 0.99, indicating a high degree of imperceptibility. In addition, this method achieves detection accuracy comparable to previous approaches, with an overall recall value of 1.00 and a TPR exceeding 0.96 across multiple forgery scenarios. This method offers the best efficiency compared to SVD, Hadamard, and Walsh methods and consistent authentication performance stability across multiple forgery levels. These advantages allow the proposed method to be developed in tampering detection applications that require speed and reliability.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200530"},"PeriodicalIF":0.0000,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intelligent Systems with Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667305325000560","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper introduces a novel fragile watermarking technique for image forgery detection using adaptive matrices derived from Walsh and Hadamard transforms. The proposed method overcomes the limitations of traditional SVD, Hadamard, and Walsh methods by eliminating negative coefficients, simplifying the algorithm structure, and optimizing the computational complexity. The embedding process uses a two-stage authentication mechanism with a 16-bit validation scheme, ensuring precise forgery localization. This adaptive approach is intelligently designed to adapt the matrix pattern to the image characteristics. At the same time, the utilization of logistic sequencing enables the generation of non-periodic and non-convergent patterns, which significantly improves authentication efficiency and accuracy. Performance evaluation shows an average PSNR value of 55.90 dB and SSIM above 0.99, indicating a high degree of imperceptibility. In addition, this method achieves detection accuracy comparable to previous approaches, with an overall recall value of 1.00 and a TPR exceeding 0.96 across multiple forgery scenarios. This method offers the best efficiency compared to SVD, Hadamard, and Walsh methods and consistent authentication performance stability across multiple forgery levels. These advantages allow the proposed method to be developed in tampering detection applications that require speed and reliability.
基于混沌序列自适应矩阵的高效脆弱水印图像篡改检测
本文介绍了一种基于Walsh变换和Hadamard变换的自适应矩阵的图像伪造检测脆弱水印技术。该方法克服了传统SVD、Hadamard和Walsh方法的局限性,消除了负系数,简化了算法结构,优化了计算复杂度。嵌入过程采用两阶段认证机制和16位验证方案,确保精确的伪造定位。这种自适应方法是智能设计的,可以使矩阵模式适应图像的特征。同时,利用逻辑排序可以生成非周期、非收敛的模式,大大提高了认证的效率和准确性。性能评价显示,平均PSNR值为55.90 dB, SSIM值在0.99以上,具有较高的不可感知程度。此外,该方法的检测精度与以前的方法相当,在多个伪造场景中,总召回值为1.00,TPR超过0.96。与SVD、Hadamard和Walsh方法相比,这种方法提供了最好的效率,并且跨多个伪造级别提供了一致的身份验证性能稳定性。这些优点使得所提出的方法在需要速度和可靠性的篡改检测应用中得到发展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.60
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信