JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2014, Vol. 44 ›› Issue (6): 63-69.doi: 10.6040/j.issn.1672-3961.0.2014.098

Previous Articles     Next Articles

Images tamper detection and recovery based on block features and chaotic sequence

ZHANG Junpeng1,2, ZHANG Qingfan1, YANG Hongjuan2   

  1. 1. School of Control Science and Engineering, Shandong University, Jinan 250100, Shandong, China;
    2. School of Information & Electrical Engineering, Shandong Jianzhu University, Jinan 250101, Shandong, China
  • Received:2014-04-04 Revised:2014-06-30 Online:2014-12-20 Published:2014-04-04

Abstract: To improve the performance of images tamper detection and recovery, an authentication watermarking scheme based on block features and chaotic sequence was presented. For each block of size 2×2 pixels,discrete cosine transform(DCT)coefficients were used to generate watermarking and embedded into the two least significant bits of its mapping block which was determined by chaotic sequence. The conventional authentication methods were improved by combining parity detection and the tampered region could be self-recovered by extracting characteristic information of the valid block. Experimental results demonstrated that the proposed method not only improved the quality and security of watermarked images, but also could detect tampered regions accurately and reconstruct images while keeping the recognition quality. Additionally, the scheme was not vulnerable to the content-only attack.

Key words: image authentication, tamper detection, digital watermarking, self-recovery, chaos

CLC Number: 

  • TP391
[1] Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Processing, 2001, 10(10):1593-1601.
[2] Ghoshal Nabin,Mandal Jyotsna Kumar. A novel technique for image authentication in frequency domain using discrete Fourier transformation technique[J]. Malaysian Journal of Computer Science, 2008, 21(1):24-32.
[3] Chun-Shien Lu, Hong-yuan Mark Liao.Structural digital signature for image authentication: an incidental distortion resistant scheme[J]. Multimedia Security Workshop 8th ACM International Conference on Multimedia, 2003, 5(2):161-173.
[4] Sun Q, Shih-Fu Chang. A secure and robust digital signature scheme for JPEG 2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3):480-494.
[5] He Hong-jie, Zhang Jiashu, Chen Fan. Adjacent-block based statistical detection method for self-embedding watermarking techniques[J]. Signal Processing, 2009, 89(8):1557-1566.
[6] Radharani S, Valarmathi M L. A study on watermarking schemes for image authentication[J]. International Journal of Computer Applications, 2010, 2(4):24-30.
[7] Qian Zhenxing, Feng Guorui, Zhang Xinping, et al. Image self-embedding with high-quality restoration capability[J]. Digital Signal Processing, 2011, 21(2):278-286.
[8] 金喜子,姜文哲. 块级篡改定位的JPEG 图像脆弱水印[J]. 电子学报,2010,38(2):1585-1589. JIN Xizi, JIANG Wenzhe. Fragile watermarking capable of locating tampered blocks in JPEG Images[J]. Acta Electronica Sinica, 2010, 38(2):1585-1589.
[9] 叶天语. 自嵌入完全盲检测顽健数字水印算法[J]. 通信学报,2012,33(10):8-15. YE Tianyu. Self-embedding robust digital watermarking algorithm with perfectly blind detection[J]. Journal on Communications, 2012, 33(10):8-15.
[10] Zhang Xinpeng, Wang Shuozhong. Fragile watermarking with error-free restoration capability[J]. IEEE Trans Multimedia, 2008, 10(8):1490-1499.
[11] Tien-You Lee, Shinfeng D Lin. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506.
[12] Chang Chin-chen, Fan Yi-hsuan, Tai Wer-liang. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(2):654-661.
[13] Luo Hao,Yu Fa-Xin. Blind image watermarking based on discrete fractional random transform and subsampling[J]. International Journal for Light and Electron Optics, 2011, 122(4):311-316.
[1] Chunrui CHENG,Beixing MAO. Adaptive sliding mode synchronization of a class of nonlinear chaotic systems [J]. Journal of Shandong University(Engineering Science), 2020, 50(5): 1-6.
[2] CHENG Chunrui. Three control schemes of chaos synchronization for fractional-order Brussel system [J]. Journal of Shandong University(Engineering Science), 2020, 50(4): 46-51.
[3] WANG Chunyan, DI Jinhong, MAO Beixing. Sliding mode synchronization of fractional-order Rucklidge systems with unknown parameters based on a new type of reaching law [J]. Journal of Shandong University(Engineering Science), 2020, 50(4): 40-45.
[4] Wei XUE,Dongcheng TAN,Mei ZHANG,Shilong LIU. Four-wing hyperchaotic system synchronization and its secure video communication based on FPGA [J]. Journal of Shandong University(Engineering Science), 2019, 49(3): 1-7.
[5] Hongming LIU,Hongyan ZENG,Wei ZHOU,Tao WANG. Optimization of job shop scheduling based on improved particle swarm optimization algorithm [J]. Journal of Shandong University(Engineering Science), 2019, 49(1): 75-82.
[6] Dongxiao WANG. Two methods for sliding mode synchronization of five-dimensional fractional-order chaotic systems with entanglement iterms [J]. Journal of Shandong University(Engineering Science), 2018, 48(5): 85-90.
[7] MENG Xiaoling, WANG Jianjun. Chaos synchronization of a class of fractional-order coronary artery systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(4): 55-60.
[8] MAO Beixing. Ratio integral sliding mode synchronization control of entanglement chaotic systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(4): 50-54.
[9] MAO Beixing, CHENG Chunrui. Self-adaptive sliding mode control of fractional-order Victor-Carmen chaotic systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(4): 31-36.
[10] MAO Beixing, WANG Dongxiao. Sliding model chaos synchronization control of a class of fractional-order multi-scroll systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(3): 79-83.
[11] LI Qingbin, WANG Xiaodong. Terminal sliding model control chaos synchronization of fractional-order emotion mode systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(3): 84-88.
[12] LIU Zhijun. Color image encryption algorithm based on complex chaos and affine transform [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(4): 1-8.
[13] SUN Meimei, HU Yun'an, WEI Jianming. Synchronization of multiwing hyperchaotic systems via adaptive sliding mode control [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(6): 45-51.
[14] HUA Jingxin, BO Yuming, CHEN Zhimin. Forecasting of real estate market based on particle swarm optimized neural network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(4): 22-30.
[15] YANG Jian-mei1, HUANG Tian-qiang1,2*, JIANG Wei-jian1. Splicing image tamper detection based on human face color temperature [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(5): 24-30.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] WANG Su-yu,<\sup>,AI Xing<\sup>,ZHAO Jun<\sup>,LI Zuo-li<\sup>,LIU Zeng-wen<\sup> . Milling force prediction model for highspeed end milling 3Cr2Mo steel[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 1 -5 .
[2] LI Kan . Empolder and implement of the embedded weld control system[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(4): 37 -41 .
[3] SHI Lai-shun,WAN Zhong-yi . Synthesis and performance evaluation of a novel betaine-type asphalt emulsifier[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(4): 112 -115 .
[4] KONG Xiang-zhen,LIU Yan-jun,WANG Yong,ZHAO Xiu-hua . Compensation and simulation for the deadband of the pneumatic proportional valve[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 99 -102 .
[5] CHEN Rui, LI Hongwei, TIAN Jing. The relationship between the number of magnetic poles and the bearing capacity of radial magnetic bearing[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 81 -85 .
[6] LI Ke,LIU Chang-chun,LI Tong-lei . Medical registration approach using improved maximization of mutual information[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 107 -110 .
[7] JI Tao,GAO Xu/sup>,SUN Tong-jing,XUE Yong-duan/sup>,XU Bing-yin/sup> . Characteristic analysis of fault generated traveling waves in 10 Kv automatic blocking and continuous power transmission lines[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 111 -116 .
[8] . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 27 -32 .
[9] WANG Li-ju,HUANG Qi-cheng,WANG Zhao-xu . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 51 -56 .
[10] SUN Dianzhu, ZHU Changzhi, LI Yanrui. [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 84 -86 .