Skip to main content
Log in

A probabilistic image authentication method based on chaos

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Fragile watermarking methods have been used as active image authentication methods. These methods must have capabilities like high capacity, high visual quality, high image authentication ability and image recovery capability. Many of the fragile watermarking methods suggested in the literature do not provide all of these capabilities. In this article, a new probabilistic image authentication method with high capacity, high visual quality, high image authenticity ability and image recovery capability is proposed. Chaotic pseudo random number generators, a new watermark generation network which similar to neural network, modulo based watermark embedding functions, modulo based watermark extraction functions, tamper detection algorithm and perceptual hash based image recovery algorithm are utilized for creating a new probabilistic image authentication method in this article. The proposed method is a block based authentication method and 3 × 3 size of overlapping neighborhood blocks are used in this method. The proposed watermark generation network uses symmetric pixels as inputs and weights to generate predicted pixel. In this step, modulo operator and random numbers are used for calculating embeddable value. Owing to chaotic random number generator, the proposed method gains probabilistic and nonlinear structure. To generate random number, logistic map is used as random number generator in the proposed image watermarking method. Then, a modulo based watermark embedding function is used for embedding embeddable value (generated watermark). In the watermark extraction step, modulo operator is used. If the predicted value differs from the extracted value, tamper detection is performed. Otherwise, image authentication is success. A new image recovery algorithm is proposed in this method. This algorithm provides image recovery for tampered areas with high visual quality. The proposed image watermarking method can authenticate grayscale and color images. The experimental results demonstrated that, the proposed method has high payload capacity, high visual quality and high image authentication ability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ansari IA, Pant M, Ahn CW (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

  2. Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. Int J Electron Commun (AEÜ) 79:207–218

    Article  Google Scholar 

  3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  4. Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  5. Christian R, Jean-Luc D (2002) A survey of watermarking algorithms for image authentication. Eurasip J Adv Sig Pr 6:613–621

    MATH  Google Scholar 

  6. El’arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626

    Article  Google Scholar 

  7. Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84:803–809

    Article  Google Scholar 

  8. Hemalatha S, Dinesh AU, Renuka A, Kamath PR (2013) A secure color image steganography in transform domain. Int J Cryptography Inf Secur 3(1):17–24

    Article  Google Scholar 

  9. Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285:1759–1766

    Article  Google Scholar 

  10. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414

    Article  Google Scholar 

  11. Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE T Multimed 12(5):345–357

    Article  Google Scholar 

  12. Lin Y-C, Varadoyan D, Girod B (2012) Image authentication using distributed source coding. IEEE T Image Process 21(1):273–283

    Article  MathSciNet  MATH  Google Scholar 

  13. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185

    Article  Google Scholar 

  14. Mao Q (2014) A fast algorithm for matrix embedding steganography. Digit Signal Process 25:248–254

    Article  Google Scholar 

  15. MATLAB (2015a) https://www.mathworks.com/products/new_products/release2015a.html. Accessed 06 January 2018

  16. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE T Circ Syst Vid 16(3):354–362

    Article  Google Scholar 

  17. Özkaynak F (2015) A novel method to improve the performance of chaos based evolutionary algorithms. Optik 126:5434–5438

    Article  Google Scholar 

  18. Patra JC, Kathik A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digit Signal Process 20:442–453

    Article  Google Scholar 

  19. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20:1597–1611

    Article  Google Scholar 

  20. Preda RO, Vizireanu DN (2015) Watermarking-based image authentication robust to JPEG compression. Electron Lett 51(23):1873–1875

    Article  Google Scholar 

  21. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image R 30:312–327

    Article  Google Scholar 

  22. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image R 31:154–164

    Article  Google Scholar 

  23. Roldan LR, Hernández MC, Chao J, Miyatake MN, Meana HP (2016) Watermarking-based color image authentication with detection and recovery capability. IEEE Lat Am T 14(2):1050–1057

    Article  Google Scholar 

  24. Saha B, Sharma S (2012) Steganographic techniques of data hiding using digital images. Def Sci J 62(1):11–18

    Article  Google Scholar 

  25. Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images. Signal Process 120:522–531

    Article  Google Scholar 

  26. Tarasova VV, Tarasov VE (2017) Logistic map with memory from economic model. Chaos, Solitons Fractals 95:84–91

    Article  MathSciNet  MATH  Google Scholar 

  27. Tuncer T (2017) A novel image authentication method based on singular value decomposition. J Fac Eng Archit Gaz 32(3):877–886

    Google Scholar 

  28. Walia E, Suneja A (2013) Fragile and blind watermarking technique based on Weber’s law for medical image authentication. IET Comput Vis 7(1):9–19

    Article  Google Scholar 

  29. Wang N, Men C (2012) Reversible fragile watermarking for 2-D vector map authentication with localization. Comput Aided Design 44:320–330

    Article  Google Scholar 

  30. Wójtowicz W, Ogiela MR (2016) Digital images authentication scheme based on bimodal biometric watermarking in an independent domain. J Vis Commun Image R 38:1–10

    Article  Google Scholar 

  31. Wu W-C, Lin Z-W (2016) SVD-based self-embedding image authentication scheme using quick response code features. J Vis Commun Image R 38:18–28

    Article  Google Scholar 

  32. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962

    Article  Google Scholar 

  33. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070–1076

    Article  Google Scholar 

  34. Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285:1725–1735

    Article  Google Scholar 

  35. Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. Int J Electron Commun (AEÜ) 69:361–370

    Article  Google Scholar 

  36. Zhang L, Tang J, Ouyang K (2017) Anti-control of period doubling bifurcation for a variable substitution model of logistic map. Optik 130:1327–1332

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Türker Tuncer.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tuncer, T. A probabilistic image authentication method based on chaos. Multimed Tools Appl 77, 21463–21480 (2018). https://doi.org/10.1007/s11042-017-5569-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5569-x

Keywords

Navigation