A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection
Abstract
:1. Introduction
2. Chaotic Mapping Algorithm
2.1. Arnold’s Cat Map Encryption Algorithm
2.2. Logistic Map
3. The Proposed Method
3.1. Embedding the Watermark
- Step 1: Original image P goes through Arnold’s cat map; we can obtain the period T from Equation (1).
- Step 2: Interception of minutes and seconds obtains the current time t; we get the value r which represents that P goes through Arnold’s cat map r times from Equation (3), and we can obtain the scrambled image Pscr from Equation (4).
- Step 3: Divide into 8-bit blocks.
- Step 4: From the current time t, the chaotic system can generate a chaotic sequence S from Equation (5) which ranges between 0 and 1; round it off and apply it to the Logistic map; fetch from t to and then we can obtain the chaotic image .
- Step 5: Using the XOR operation between and , we can obtain which is a binary chaotic watermark to be expressed as:
- Step 6: The least significant bit of is replaced by .
- Step 7: Use Arnold's cat map to let the modified reverse (T–r) times to obtain the final result .
3.2. Fetching the Watermark
- Step 1: Intercept of minutes and seconds obtains the current time t from Equation (2); the analysis image goes through Arnold's cat map r times; it can obtain the scrambled image .
- Step 2: Divide into 8-bit blocks.
- Step 3: From the current time t, the chaotic system can generate a chaotic sequence S from Equation (5), which ranges between 0 and 1; round it off and apply it to the Logistic map; fetch from t to , and then we can obtain the chaotic image .
- Step 4: Using the XOR operation between the LSB of and , we can obtain , which is a binary fetched watermark to be expressed as:
- Step 5: The binary watermark is compared with ; take a different place going through Arnold's cat map (T–r) times, and then we can see which place was modified.
4. Experimental Results
5. Conclusions
Acknowledgement
Conflict of Interest
References
- Koch, E.; Zhao, J. Towards robust and hidden image copyright labeling. In Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 20–22 June 1995; pp. 452–455.
- Hsu, E.; Wu, J.L. Multiresolution watermarking for digital images. IEEE Trans. Circuit Syst. II: Analog Digital Signal Process. 1998, 45, 1097–1101. [Google Scholar]
- Chang, C.C.; Chen, C.F.; Liu, L.J. A secure fragile watermarking scheme based on chaos-and-hamming code. J. Syst. Software. 2011, 84, 1462–1470. [Google Scholar] [CrossRef]
- Abhayaratne, C.; Bhowmik, D. Scalable watermark extraction for real-time authentication of JPEG 2000 images. J. Real-Time Image Process. 2011, 6, 1–19. [Google Scholar] [CrossRef]
- Lin, P.L.; Hsieh, C.K.; Huang, P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit. 2005, 38, 2519–2529. [Google Scholar] [CrossRef]
- Fridrich, J. Image watermarking for tamper detection. In Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, USA, 4–7 October 1998; pp. 404–408.
- Fridrich, J.; Goljan, M.; Baldoza, A.C. New fragile authentication watermark for images. In Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, 10–13 September 2000; pp. 446–449.
- Dittmann, J.; Steinmetz, A.; Steinmetz, R. Content-based digital signature for motion pictures authentication and content-fragile watermarking. In Proceedings of the IEEE International Conference on Multimedia Computing Systems, Florence, Italy, 7–11 June 1999; pp. 209–213.
- Walton, S. Information authentication for a slippery new age. Dr. Dobbs Journa. 1995, 20, 18–26. [Google Scholar]
- Fridrich, J. Symmetric ciphers based on two dimensional chaotic maps. Int. J. Bifurcation Chaos. 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
- Wong, P.W. A public Key watermark for image verification and authentication. In Proceedings of IEEE International Conference on Image Processing, Chicago, IL, USA, 4–7 October 1998; pp. 455–459.
- Lagendijk, R.L.; Langelaar, G.C.; Setyawan, I. Watermarking digital image and video data: A state-of-the-art overview. IEEE Signal Process. Mag. 2000, 17, 20–46. [Google Scholar]
- Suthaharan, S. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit. Letters. 2004, 25, 1893–1903. [Google Scholar] [CrossRef]
- Wang, X.Y.; Miao, E.N.; Yang, H.Y. A new SVM-based image watermarking using Gaussian-Hermite moments. Appl. Soft Comput. 2012, 12, 887–903. [Google Scholar] [CrossRef]
- Cavalcante, H.L.D. de S.; Vasconcelos, G.L. Power law periodicity in the tangent bifurcations of the logistic map. Phys. A: Stat. Mech. Appl. 2001, 295, 291–296. [Google Scholar] [CrossRef]
- Pareek, N.K.; Patidar, Vinod; Sud, K.K. Image encryption using chaotic logistic map. Image Vision Computing. 2006, 24, 926–934. [Google Scholar]
- Hauhs, M.; Widemann, B.T. Applications of algebra and coalgebra in scientific modelling: Illustrated with the Logistic Map. Electron. Notes Theor. Comput. Sci. 2010, 264, 105–123. [Google Scholar] [CrossRef]
- Díaz-Méndez, A.; Marquina-Pérez, J.V.; Cruz-Irisson, M.; Vázquez-Medina, R.; Del-Río-Correa, J.L. Chaotic noise MOS generator based on logistic map. Mater. J. 2009, 40, 638–640. [Google Scholar] [CrossRef]
- Jie Dai, J. A result regarding convergence of random logistic maps. Statistics Probability Lett. 2000, 40, 11–14. [Google Scholar]
- Savely, R.; Victor, M.; Shlomo, H. An explicit solution for the logistic map. Phys. A: Stat. Mech. Its Appl. 1999, 264, 222–225. [Google Scholar]
- Leonel, E. D.; Kamphorst Leal da Silva, J.; Oliffson Kamphorst, S. Transients in a time-dependent logistic map. Phys. A: Stat. Mech. Its Appl. 2001, 295, 280–284. [Google Scholar] [CrossRef]
- Zhao, D.; Chen, G.; Liu, W. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals. 2004, 22, 47–54. [Google Scholar]
- Zhao, J.; Zhou, M.; Xie, H.; Peng, J.; Zhou, X. A novel wavelet image watermarking scheme combined with chaos sequence and neural network. Lecture Note Comput. Sci. 2004, 3174, 663–668. [Google Scholar]
- Guyeux, C.; Bahi, J.M. A new chaos-based watermarking algorithm. In Proceedings of the International Conference on Security and Cryptography (SECRYPT), Athens, Greece, 26–28 July 2010; pp. 1–4.
- Lee, Z.J.; Lin, S.W.; Su, S.F.; Lin, C.Y. A hybrid watermarking technique applied to digital images. Appl. Soft Computing. 2008, 8, 798–808. [Google Scholar] [CrossRef]
- Rawat, S.; Raman, B. A chaotic system based fragile watermarking scheme for image tamper detection. AEU-Int. J. Electron. Commun. 2011, 65, 840–847. [Google Scholar] [CrossRef]
© 2013 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license ( http://creativecommons.org/licenses/by/3.0/).
Share and Cite
Chen, Y.-L.; Yau, H.-T.; Yang, G.-J. A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Entropy 2013, 15, 3170-3185. https://doi.org/10.3390/e15083260
Chen Y-L, Yau H-T, Yang G-J. A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Entropy. 2013; 15(8):3170-3185. https://doi.org/10.3390/e15083260
Chicago/Turabian StyleChen, Young-Long, Her-Terng Yau, and Guo-Jheng Yang. 2013. "A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection" Entropy 15, no. 8: 3170-3185. https://doi.org/10.3390/e15083260
APA StyleChen, Y. -L., Yau, H. -T., & Yang, G. -J. (2013). A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Entropy, 15(8), 3170-3185. https://doi.org/10.3390/e15083260