A recoverable chaos-based fragile watermarking with high PSNR preservation

نویسندگان

  • Ming Li
  • Di Xiao
  • Hong Liu
  • Sen Bai
چکیده

The preservation of high peak signal-to-noise ratio of the watermarked image is required in some applications. The chaos-based fragile watermarking proposed by Rawat et al. in 2011 can meet this requirement, for only one LSB plane of the original image is modified by the watermark data. However, there are three drawbacks in the original scheme: (i) insecurity, the host image can be tampered without being detected; (ii) the detected tampered area is incomplete; and (iii) the most important thing is that the tampered area is unrecoverable. Enlightened by the work of Rawat et al., we propose a new recoverable chaos-based fragile watermarking scheme, in which all of the drawbacks in the original scheme have been overcome, while the size of the watermark is unchanged, therefore the high peak signal-to-noise ratio characteristic can be preserved. The chaotic map is used to ensure the security; the idea of block dividing is adopted to improve the tamper detection and to make storage space for the recovery data embedding; and the border matching recovery based on vector quantization is proposed to improve the recovery result of the target image. Experiments show that our method is secure and recoverable, and the recovery ability is extremely satisfactory. Copyright © 2016 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks

Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...

متن کامل

Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...

متن کامل

A chaos-based video watermarking algorithm

The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...

متن کامل

Robust Chaos Based Image Watermarking Scheme for Fractal-Wavelet

Recently, chaos based mapping has widely been applied for image watermarking due to their inherent cryptographic features. Fractals are one of the robust techniques used for image compression. When a Chaotic map is used in conjunction with Fractal-Wavelet, efficiency may be improved in the process of image watermarking. In this paper, Chaos based watermarking method is proposed in cascade with ...

متن کامل

Fragile Watermarking for Image Authentication: Survey

In this paper, we report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their working, contained challenges, possible at...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2016