Novel Chaotic Fragile Watermarking Algorithm for Image Authentication  

Novel Chaotic Fragile Watermarking Algorithm for Image Authentication

在线阅读下载全文

作  者:刘培培 朱中梁 

机构地区:[1]School of Information Science and Technology, Southwest Jiaotong University [2]College of Information Engineering, Chengdu University of Technology [3]Key Lab, Southwest Institute of Electron and Telecom Techniques

出  处:《Journal of Southwest Jiaotong University(English Edition)》2009年第2期123-128,共6页西南交通大学学报(英文版)

基  金:The National Science Foundation of China (NSFC) (No.60702025);the Research Fund for the Doctoral Program of Higher Education (RFDP)( No.20070613024);Sichuan Youth Science & Technology Foundation of China (No. 07ZQ026-004);Southwest Jiaotong University Development Foundation (No.2006A04)

摘  要:Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.

关 键 词:Fragile watermarking AUTHENTICATION Chaotic map Block-wise independent 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象