Skip to main content
Log in

Composite chaos-based lossless image authentication and tamper localization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To improve the robustness to combined attack of signal processing plus tamper, a composite chaos-based lossless scheme for image authentication and tamper localization is proposed. A non-successive composite chaos (NSCC) is described, and its performance is analysed by some evaluation indicators. Then NSCC is employed to disturb original image and generate chaotic logo, which enhances the security and robustness of lossless image authentication scheme due to the good performance of NSCC in these aspects of randomness, complexity and ability of anti-forecast technology. Experimental results demonstrate that the proposed scheme is not only safe, but also realizes the correct extraction of logo and precise detection of tampered region position and shape under various attacks, especially signal processing plus tamper attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Chen G, Lai D (1996) Feedback control of Lyapunov exponents for discrete-time chaotic dynamical systems. Int J Bifurc Chaos 6:1341–1349

    Article  MATH  Google Scholar 

  2. Chen G, Lai D (1997) Making a dynamical system chaotic: feedback control of Lyapunov exponents for discrete-time dynamical systems. IEEE Trans Circ Syst I 44(3):250–253

    Article  MathSciNet  Google Scholar 

  3. Chen SY, Leung H (2008) Chaotic watermarking for video authentication in surveillance applications. IEEE Trans Circuits Syst Video Technol 18(5):704–709

    Article  Google Scholar 

  4. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol B 10(4):722–732

    Article  Google Scholar 

  5. Huang X, Yi M, Susilo W (2011) Preserving transparency and accountability in optimistic fair exchange of digital signatures. IEEE Trans Inf Forensic Secur 6(2):498–512

    Article  Google Scholar 

  6. Mao L, Fan Y, Wang H, Lv G (2011) Fractal and neural networks based watermark identification. Multimed Tools Appl 52:201–219

    Article  Google Scholar 

  7. Pincus SM (1995) Approximate entropy (ApEn) as a complexity measure. Chaos 5(1):110–117

    Article  MathSciNet  Google Scholar 

  8. Poljicak A, Mandic L, Agic D (2011) Robustness of a DFT based Image watermarking method against AM Halftoning. Teh Vjesn 18(2):161–166

    Google Scholar 

  9. Radu OP, Dragos NV (2011) Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20:013022-1–013022-11

    Google Scholar 

  10. Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-Int J Electron C 65(10):840–847

    Article  Google Scholar 

  11. Rukhin A, Soto J, Nechvatal J. A statistical test suite for random and pseudorandom number generator for cryptographic applications. http://csrc.nist.gov/rng/

  12. Sun FY, Lu Z (2011) Digital image encryption with chaotic map lattices. Chinese Phys B 20(4):040506-1–040506-7

    Article  Google Scholar 

  13. Tian L, Zheng N, Xue J (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Signal Process-Image 26(8):427–437

    Article  Google Scholar 

  14. Tong X, Cui M (2009) Image encryption based on disturbed composite chaos. Sci China-Inform Sci 39(6):588–597

    Google Scholar 

  15. Walton S (1995) Information authentication for a slippery new age. Dr Dobbs J 20(4):18–26

    MathSciNet  Google Scholar 

  16. Yuen C, Wong K (2012) Chaos-based encryption for fractal image coding. Chinese Phys B 21(1):010502-1–010502-12

    Article  MathSciNet  Google Scholar 

  17. Zhang LH, Liao XF, Wang XB (2005) An image encryption approach based on chaotic maps. Chaos Soliton Fract 24(3):759–765

    Article  MathSciNet  MATH  Google Scholar 

  18. Zhang J, Xiao X (2000) Predicting low-dimensional chaotic time series using Volterra adaptive filters. Acta Phys Sin 49(3):403–408

    Google Scholar 

  19. Zhang S, Xiao X (2005) A new method of global prediction for chaotic time series based on continued fractions. Acta Phys Sin 54(11):5062–5068

    Google Scholar 

Download references

Acknowledgment

This research is supported by the Natural Science Foundation of Educational Commission of Jiangxi Province of China under Grant GJJ12614.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangyong Gao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gao, G. Composite chaos-based lossless image authentication and tamper localization. Multimed Tools Appl 63, 947–964 (2013). https://doi.org/10.1007/s11042-012-1329-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1329-0

Keywords

Navigation