Skip to main content
Log in

Chaotic watermark for blind forgery detection in images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new chaos based watermarking scheme for effective tamper detection in images is proposed. The proposed scheme is able to detect any possible forgery and spot the areas which have been tampered. To improve the efficiency of the proposed scheme, a binary watermark is constructed from the image itself, which makes the watermark unique for every image and guarantee the blindness in the detection process. To guarantee the security of the proposed scheme, chaotic maps are used to complicate the embedding and the detection process to reduce the vulnerability to different attacks. Experimental results and security analysis show that the proposed scheme achieves superior tamper detection under common attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Bao J, Yang Q (2012) Period of the discrete arnold cat map and general cat map. Nonlinear Dyn 70:1365–1375

    Article  MathSciNet  MATH  Google Scholar 

  2. Benrhouma O, Hermassi H, Belghith S (2014) Tamper detection and self-recovery scheme by dwt watermarking. Nonlinear Dyn. doi:10.1007/s11071-014-1777-3

  3. Bittman J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceeding of IEEE international conference on miltimedia computing systems, pp 209–213

  4. Chang SF, Lin CY (2001) A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11:153–168

    Article  Google Scholar 

  5. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446

    Article  Google Scholar 

  6. Di Martino F., Sessa S. (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195:62–90

    Article  Google Scholar 

  7. Fridrich J (2002) Security of fragile authentication watermaks with localization. Proc SPIE Sec Watermarking Multimedia Contents 4675:691–700

    Article  Google Scholar 

  8. Goljan M, Baldoza AC, Fridrich J (2000) New fragile authentication watermarks for image. Proc IEEE Int Conf Image Process 1:446–449

    Google Scholar 

  9. Guan ZH, Wu XY (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365:403–406

    Article  MathSciNet  Google Scholar 

  10. Hang HM, Tang CW (2003) A feature-based robust digital image watermaking shceme. IEEE Trans Signal Process 51:950–958

    Article  MathSciNet  Google Scholar 

  11. Horng S-J, Farfoura ME, Fan P, Wang X, Li T, Guo J-M (2014) A low cost fragile watermarking scheme in h.264/avc compressed domain. Multimedia Tools Appl 72:2469–2495

    Article  Google Scholar 

  12. Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl 72:3085–3103

    Article  Google Scholar 

  13. Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24:1099–1105

    Article  Google Scholar 

  14. Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283:1737–1743

    Article  Google Scholar 

  15. Huo Y, He H, Chen F (2013) A semi-fragile image watermarking algorithm with two-stage detection. Multimed Tools Appl. doi:10.1007/s11042-012-1317-4

  16. Kankanhalli MS, Guan X, Huang ZY, Wu YH, Chang EC (2003) Robust image authentication using content based compression. ACM Multimedia Syst J 2:121–130

    Google Scholar 

  17. Koutsonanos DE, Strintzis MG, Simitopoulos D (2003) Robust image watermarking based on generalized radon transformations. IEEE Trans Circuits Syst Video Technol 13:732–745

    Article  Google Scholar 

  18. Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recog 41:3497–3506

    Article  MATH  Google Scholar 

  19. Lin C-Y, Chang S-F (2001) Sari: Self-authentication-and-recovery image watermarking system. ACM Multimedia, Ottawa

    Book  Google Scholar 

  20. Lin CY, Chang SF (1998) A robust image authentication method surving jpeg lossy compression. In: Proceeding of SPIE international conference on storage and retrieval of image/video database, vol 3312, pp 296–307

  21. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38:2519–2529

    Article  Google Scholar 

  22. Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10:746–757

    Article  Google Scholar 

  23. Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36:9869–9878

    Article  Google Scholar 

  24. Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36:11509–11516

    Article  Google Scholar 

  25. Lin W-H, Horng S-J, Kao T-W, Chen R-J, Chen Y-H, Lee C-L, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36:11888–11894

    Article  Google Scholar 

  26. Lu CS, Liao HYM, Sze CJ (2000) Structural digital signature for image authentication : an incidental distortion resistant scheme. In: Proceeding of the miltimedia security workshop 8th ACM international conference on multimedia, pp 115–128

  27. Lu TC, Chang CC, Hu YS (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446

    Article  Google Scholar 

  28. Lu H, Chung FL, Lu W (2006) Robust digitalimage watermarking based on sub-sampling. Appl Math Comput 181:886–893

    MathSciNet  MATH  Google Scholar 

  29. Luo T, Jiang G, Wang X, Yu M, Shao F, Peng Z (2013) Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing. Multimed Tools Appl. doi:10.1007/s11042-013-1435-7

  30. Mannai O, Ben Jemaa Z, Belghith S (2014) Correlation propernes of sequences generated by a first order scalar time-dely chaotic system. WSCAR

  31. Memon N, Wong P (2000) Secret and public key authentication watermarking that resist vector quantization attack. Proc SPIE Sec Watermarking Multimedia Contents 3971:417–427

    Article  Google Scholar 

  32. Mintzer F, Yeung M (1997) An invisible watermarking technique for image verification. Proc IEEE Int Conf Image Process 2:680–683

    Google Scholar 

  33. Ozturk S, Aslantas V, Ozer S (2009) Improving the performance of dct-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282:2806–2817

    Article  Google Scholar 

  34. Poonkuntran S, Rajesh RS (2012) Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl. doi:10.1007/s11042-012-1227-5

  35. Raman B, Bhatnagar G (2011) A new robust reference logo watermarking scheme. Multimedia Tools Appl 52:621–640

    Article  Google Scholar 

  36. Raman B, Rawat S (2011) A chaotic system based fragile watermarking scheme for image tamper detection. Int J Electron Commun 65:840–847

    Article  Google Scholar 

  37. Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMedia 19:62–73

    Article  Google Scholar 

  38. Sharmar G, Tekalp AM, Celik MU (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–594

    Article  Google Scholar 

  39. Ward RK, Pitas I, Paquet AH (2003) Wavelet packets-based digital watermaking for image verification and authentication. Signal Process 183:2117–2132

    MATH  Google Scholar 

  40. Wang X, Teng L, Wang X (2013) Cryptanalysis and improvement of chaotic system based fragile watermarking scheme. Int J Electron Commun 67:540–547

    Article  Google Scholar 

  41. Yang YP, Lu MY, Niu PP, Wang XY (2011) A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Syst Appl 38:2081–2098

    Article  Google Scholar 

Download references

Acknowledgments

We sincerely thank the two ministries of scientific research in Egypt and Tunisia (Egypt-Tunisia Cooperation Programme:4-13-A1) for their valuable support. The authors are also thankful to the editor and the anonymous reviewers for their advices, valuable comments and suggestions that improved the technical and editorial quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oussama Benrhouma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benrhouma, O., Hermassi, H., Abd El-Latif, A.A. et al. Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75, 8695–8718 (2016). https://doi.org/10.1007/s11042-015-2786-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2786-z

Keywords

Navigation