Abstract
In this paper, a new chaos based watermarking scheme for effective tamper detection in images is proposed. The proposed scheme is able to detect any possible forgery and spot the areas which have been tampered. To improve the efficiency of the proposed scheme, a binary watermark is constructed from the image itself, which makes the watermark unique for every image and guarantee the blindness in the detection process. To guarantee the security of the proposed scheme, chaotic maps are used to complicate the embedding and the detection process to reduce the vulnerability to different attacks. Experimental results and security analysis show that the proposed scheme achieves superior tamper detection under common attacks.
Similar content being viewed by others
References
Bao J, Yang Q (2012) Period of the discrete arnold cat map and general cat map. Nonlinear Dyn 70:1365–1375
Benrhouma O, Hermassi H, Belghith S (2014) Tamper detection and self-recovery scheme by dwt watermarking. Nonlinear Dyn. doi:10.1007/s11071-014-1777-3
Bittman J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceeding of IEEE international conference on miltimedia computing systems, pp 209–213
Chang SF, Lin CY (2001) A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11:153–168
Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446
Di Martino F., Sessa S. (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195:62–90
Fridrich J (2002) Security of fragile authentication watermaks with localization. Proc SPIE Sec Watermarking Multimedia Contents 4675:691–700
Goljan M, Baldoza AC, Fridrich J (2000) New fragile authentication watermarks for image. Proc IEEE Int Conf Image Process 1:446–449
Guan ZH, Wu XY (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365:403–406
Hang HM, Tang CW (2003) A feature-based robust digital image watermaking shceme. IEEE Trans Signal Process 51:950–958
Horng S-J, Farfoura ME, Fan P, Wang X, Li T, Guo J-M (2014) A low cost fragile watermarking scheme in h.264/avc compressed domain. Multimedia Tools Appl 72:2469–2495
Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl 72:3085–3103
Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24:1099–1105
Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283:1737–1743
Huo Y, He H, Chen F (2013) A semi-fragile image watermarking algorithm with two-stage detection. Multimed Tools Appl. doi:10.1007/s11042-012-1317-4
Kankanhalli MS, Guan X, Huang ZY, Wu YH, Chang EC (2003) Robust image authentication using content based compression. ACM Multimedia Syst J 2:121–130
Koutsonanos DE, Strintzis MG, Simitopoulos D (2003) Robust image watermarking based on generalized radon transformations. IEEE Trans Circuits Syst Video Technol 13:732–745
Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recog 41:3497–3506
Lin C-Y, Chang S-F (2001) Sari: Self-authentication-and-recovery image watermarking system. ACM Multimedia, Ottawa
Lin CY, Chang SF (1998) A robust image authentication method surving jpeg lossy compression. In: Proceeding of SPIE international conference on storage and retrieval of image/video database, vol 3312, pp 296–307
Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38:2519–2529
Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10:746–757
Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36:9869–9878
Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36:11509–11516
Lin W-H, Horng S-J, Kao T-W, Chen R-J, Chen Y-H, Lee C-L, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36:11888–11894
Lu CS, Liao HYM, Sze CJ (2000) Structural digital signature for image authentication : an incidental distortion resistant scheme. In: Proceeding of the miltimedia security workshop 8th ACM international conference on multimedia, pp 115–128
Lu TC, Chang CC, Hu YS (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446
Lu H, Chung FL, Lu W (2006) Robust digitalimage watermarking based on sub-sampling. Appl Math Comput 181:886–893
Luo T, Jiang G, Wang X, Yu M, Shao F, Peng Z (2013) Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing. Multimed Tools Appl. doi:10.1007/s11042-013-1435-7
Mannai O, Ben Jemaa Z, Belghith S (2014) Correlation propernes of sequences generated by a first order scalar time-dely chaotic system. WSCAR
Memon N, Wong P (2000) Secret and public key authentication watermarking that resist vector quantization attack. Proc SPIE Sec Watermarking Multimedia Contents 3971:417–427
Mintzer F, Yeung M (1997) An invisible watermarking technique for image verification. Proc IEEE Int Conf Image Process 2:680–683
Ozturk S, Aslantas V, Ozer S (2009) Improving the performance of dct-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282:2806–2817
Poonkuntran S, Rajesh RS (2012) Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl. doi:10.1007/s11042-012-1227-5
Raman B, Bhatnagar G (2011) A new robust reference logo watermarking scheme. Multimedia Tools Appl 52:621–640
Raman B, Rawat S (2011) A chaotic system based fragile watermarking scheme for image tamper detection. Int J Electron Commun 65:840–847
Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMedia 19:62–73
Sharmar G, Tekalp AM, Celik MU (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–594
Ward RK, Pitas I, Paquet AH (2003) Wavelet packets-based digital watermaking for image verification and authentication. Signal Process 183:2117–2132
Wang X, Teng L, Wang X (2013) Cryptanalysis and improvement of chaotic system based fragile watermarking scheme. Int J Electron Commun 67:540–547
Yang YP, Lu MY, Niu PP, Wang XY (2011) A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Syst Appl 38:2081–2098
Acknowledgments
We sincerely thank the two ministries of scientific research in Egypt and Tunisia (Egypt-Tunisia Cooperation Programme:4-13-A1) for their valuable support. The authors are also thankful to the editor and the anonymous reviewers for their advices, valuable comments and suggestions that improved the technical and editorial quality of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Benrhouma, O., Hermassi, H., Abd El-Latif, A.A. et al. Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75, 8695–8718 (2016). https://doi.org/10.1007/s11042-015-2786-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2786-z