JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2014, Vol. 44 ›› Issue (6): 63-69.doi: 10.6040/j.issn.1672-3961.0.2014.098

Previous Articles     Next Articles

Images tamper detection and recovery based on block features and chaotic sequence

ZHANG Junpeng1,2, ZHANG Qingfan1, YANG Hongjuan2   

  1. 1. School of Control Science and Engineering, Shandong University, Jinan 250100, Shandong, China;
    2. School of Information & Electrical Engineering, Shandong Jianzhu University, Jinan 250101, Shandong, China
  • Received:2014-04-04 Revised:2014-06-30 Online:2014-12-20 Published:2014-04-04

Abstract: To improve the performance of images tamper detection and recovery, an authentication watermarking scheme based on block features and chaotic sequence was presented. For each block of size 2×2 pixels,discrete cosine transform(DCT)coefficients were used to generate watermarking and embedded into the two least significant bits of its mapping block which was determined by chaotic sequence. The conventional authentication methods were improved by combining parity detection and the tampered region could be self-recovered by extracting characteristic information of the valid block. Experimental results demonstrated that the proposed method not only improved the quality and security of watermarked images, but also could detect tampered regions accurately and reconstruct images while keeping the recognition quality. Additionally, the scheme was not vulnerable to the content-only attack.

Key words: image authentication, tamper detection, digital watermarking, self-recovery, chaos

CLC Number: 

  • TP391
[1] Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Processing, 2001, 10(10):1593-1601.
[2] Ghoshal Nabin,Mandal Jyotsna Kumar. A novel technique for image authentication in frequency domain using discrete Fourier transformation technique[J]. Malaysian Journal of Computer Science, 2008, 21(1):24-32.
[3] Chun-Shien Lu, Hong-yuan Mark Liao.Structural digital signature for image authentication: an incidental distortion resistant scheme[J]. Multimedia Security Workshop 8th ACM International Conference on Multimedia, 2003, 5(2):161-173.
[4] Sun Q, Shih-Fu Chang. A secure and robust digital signature scheme for JPEG 2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3):480-494.
[5] He Hong-jie, Zhang Jiashu, Chen Fan. Adjacent-block based statistical detection method for self-embedding watermarking techniques[J]. Signal Processing, 2009, 89(8):1557-1566.
[6] Radharani S, Valarmathi M L. A study on watermarking schemes for image authentication[J]. International Journal of Computer Applications, 2010, 2(4):24-30.
[7] Qian Zhenxing, Feng Guorui, Zhang Xinping, et al. Image self-embedding with high-quality restoration capability[J]. Digital Signal Processing, 2011, 21(2):278-286.
[8] 金喜子,姜文哲. 块级篡改定位的JPEG 图像脆弱水印[J]. 电子学报,2010,38(2):1585-1589. JIN Xizi, JIANG Wenzhe. Fragile watermarking capable of locating tampered blocks in JPEG Images[J]. Acta Electronica Sinica, 2010, 38(2):1585-1589.
[9] 叶天语. 自嵌入完全盲检测顽健数字水印算法[J]. 通信学报,2012,33(10):8-15. YE Tianyu. Self-embedding robust digital watermarking algorithm with perfectly blind detection[J]. Journal on Communications, 2012, 33(10):8-15.
[10] Zhang Xinpeng, Wang Shuozhong. Fragile watermarking with error-free restoration capability[J]. IEEE Trans Multimedia, 2008, 10(8):1490-1499.
[11] Tien-You Lee, Shinfeng D Lin. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506.
[12] Chang Chin-chen, Fan Yi-hsuan, Tai Wer-liang. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(2):654-661.
[13] Luo Hao,Yu Fa-Xin. Blind image watermarking based on discrete fractional random transform and subsampling[J]. International Journal for Light and Electron Optics, 2011, 122(4):311-316.
[1] WANG Dongxiao. Two methods for sliding mode synchronization of five-dimensional fractional-order chaotic systems with entanglement iterms [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(5): 85-90.
[2] MENG Xiaoling, WANG Jianjun. Chaos synchronization of a class of fractional-order coronary artery systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(4): 55-60.
[3] MAO Beixing. Ratio integral sliding mode synchronization control of entanglement chaotic systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(4): 50-54.
[4] MAO Beixing, CHENG Chunrui. Self-adaptive sliding mode control of fractional-order Victor-Carmen chaotic systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(4): 31-36.
[5] LI Qingbin, WANG Xiaodong. Terminal sliding model control chaos synchronization of fractional-order emotion mode systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(3): 84-88.
[6] MAO Beixing, WANG Dongxiao. Sliding model chaos synchronization control of a class of fractional-order multi-scroll systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(3): 79-83.
[7] LIU Zhijun. Color image encryption algorithm based on complex chaos and affine transform [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(4): 1-8.
[8] SUN Meimei, HU Yun'an, WEI Jianming. Synchronization of multiwing hyperchaotic systems via adaptive sliding mode control [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(6): 45-51.
[9] HUA Jingxin, BO Yuming, CHEN Zhimin. Forecasting of real estate market based on particle swarm optimized neural network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(4): 22-30.
[10] YANG Jian-mei1, HUANG Tian-qiang1,2*, JIANG Wei-jian1. Splicing image tamper detection based on human face color temperature [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(5): 24-30.
[11] ZHANG Fei, GENG Hong-qin. Optimization of job-shop scheduling problem based on chaos particle swarm optimization algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(3): 19-22.
[12] LI Yong-sheng, QU Liang-dong, LI Xi. Adaptive pheromone updating ant colony algorithms for solving QoS multicast routing problems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2011, 41(4): 38-43.
[13] ZHANG Xin-guo1, XU Chong-fang1*, WANG Jin-shuang1, YAN Ji-cong1, HAN Ting-wu1,2. The design method and application of the non-inductive Chua′s circuit [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(6): 134-138.
[14] JIN Xin,JIANG Ming-yan . Chaos synchronization control for a new chaotic system with diverse structures base on nonlinear control [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(5): 78-82 .
[15] ZHANG Jin-song,LI Qi-qiang,WANG Zhao-xia . Hybrid particle swarm optimization algorithm based on the chaos search [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 47-50 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!