Abstract
Fragile watermarking methods have been used as active image authentication methods. These methods must have capabilities like high capacity, high visual quality, high image authentication ability and image recovery capability. Many of the fragile watermarking methods suggested in the literature do not provide all of these capabilities. In this article, a new probabilistic image authentication method with high capacity, high visual quality, high image authenticity ability and image recovery capability is proposed. Chaotic pseudo random number generators, a new watermark generation network which similar to neural network, modulo based watermark embedding functions, modulo based watermark extraction functions, tamper detection algorithm and perceptual hash based image recovery algorithm are utilized for creating a new probabilistic image authentication method in this article. The proposed method is a block based authentication method and 3 × 3 size of overlapping neighborhood blocks are used in this method. The proposed watermark generation network uses symmetric pixels as inputs and weights to generate predicted pixel. In this step, modulo operator and random numbers are used for calculating embeddable value. Owing to chaotic random number generator, the proposed method gains probabilistic and nonlinear structure. To generate random number, logistic map is used as random number generator in the proposed image watermarking method. Then, a modulo based watermark embedding function is used for embedding embeddable value (generated watermark). In the watermark extraction step, modulo operator is used. If the predicted value differs from the extracted value, tamper detection is performed. Otherwise, image authentication is success. A new image recovery algorithm is proposed in this method. This algorithm provides image recovery for tampered areas with high visual quality. The proposed image watermarking method can authenticate grayscale and color images. The experimental results demonstrated that, the proposed method has high payload capacity, high visual quality and high image authentication ability.








Similar content being viewed by others
References
Ansari IA, Pant M, Ahn CW (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. Int J Electron Commun (AEÜ) 79:207–218
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Christian R, Jean-Luc D (2002) A survey of watermarking algorithms for image authentication. Eurasip J Adv Sig Pr 6:613–621
El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84:803–809
Hemalatha S, Dinesh AU, Renuka A, Kamath PR (2013) A secure color image steganography in transform domain. Int J Cryptography Inf Secur 3(1):17–24
Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285:1759–1766
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414
Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE T Multimed 12(5):345–357
Lin Y-C, Varadoyan D, Girod B (2012) Image authentication using distributed source coding. IEEE T Image Process 21(1):273–283
Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185
Mao Q (2014) A fast algorithm for matrix embedding steganography. Digit Signal Process 25:248–254
MATLAB (2015a) https://www.mathworks.com/products/new_products/release2015a.html. Accessed 06 January 2018
Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE T Circ Syst Vid 16(3):354–362
Özkaynak F (2015) A novel method to improve the performance of chaos based evolutionary algorithms. Optik 126:5434–5438
Patra JC, Kathik A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digit Signal Process 20:442–453
Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20:1597–1611
Preda RO, Vizireanu DN (2015) Watermarking-based image authentication robust to JPEG compression. Electron Lett 51(23):1873–1875
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image R 30:312–327
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image R 31:154–164
Roldan LR, Hernández MC, Chao J, Miyatake MN, Meana HP (2016) Watermarking-based color image authentication with detection and recovery capability. IEEE Lat Am T 14(2):1050–1057
Saha B, Sharma S (2012) Steganographic techniques of data hiding using digital images. Def Sci J 62(1):11–18
Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images. Signal Process 120:522–531
Tarasova VV, Tarasov VE (2017) Logistic map with memory from economic model. Chaos, Solitons Fractals 95:84–91
Tuncer T (2017) A novel image authentication method based on singular value decomposition. J Fac Eng Archit Gaz 32(3):877–886
Walia E, Suneja A (2013) Fragile and blind watermarking technique based on Weber’s law for medical image authentication. IET Comput Vis 7(1):9–19
Wang N, Men C (2012) Reversible fragile watermarking for 2-D vector map authentication with localization. Comput Aided Design 44:320–330
Wójtowicz W, Ogiela MR (2016) Digital images authentication scheme based on bimodal biometric watermarking in an independent domain. J Vis Commun Image R 38:1–10
Wu W-C, Lin Z-W (2016) SVD-based self-embedding image authentication scheme using quick response code features. J Vis Commun Image R 38:18–28
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070–1076
Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285:1725–1735
Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. Int J Electron Commun (AEÜ) 69:361–370
Zhang L, Tang J, Ouyang K (2017) Anti-control of period doubling bifurcation for a variable substitution model of logistic map. Optik 130:1327–1332
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tuncer, T. A probabilistic image authentication method based on chaos. Multimed Tools Appl 77, 21463–21480 (2018). https://doi.org/10.1007/s11042-017-5569-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5569-x