Composite chaos-based lossless image authentication and tamper localization

To improve the robustness to combined attack of signal processing plus tamper, a composite chaos-based lossless scheme for image authentication and tamper localization is proposed. A non-successive composite chaos (NSCC) is described, and its performance is analysed by some evaluation indicators. Then NSCC is employed to disturb original image and generate chaotic logo, which enhances the security and robustness of lossless image authentication scheme due to the good performance of NSCC in these aspects of randomness, complexity and ability of anti-forecast technology. Experimental results demonstrate that the proposed scheme is not only safe, but also realizes the correct extraction of logo and precise detection of tampered region position and shape under various attacks, especially signal processing plus tamper attack.

[1]  Henry Leung,et al.  Chaotic Watermarking for Video Authentication in Surveillance Applications , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Guanrong Chen,et al.  FEEDBACK CONTROL OF LYAPUNOV EXPONENTS FOR DISCRETE-TIME DYNAMICAL SYSTEMS , 1996 .

[3]  Guanrong Chen,et al.  Making a dynamical system chaotic: feedback control of Lyapunov exponents for discrete-time dynamical systems , 1997 .

[4]  L. Mandic,et al.  ROBUSTNESS OF A DFT BASED IMAGE WATERMARKING METHOD AGAINST AM HALFTONING , 2011 .

[5]  Yang-Yu Fan,et al.  Fractal and neural networks based watermark identification , 2010, Multimedia Tools and Applications.

[6]  S. Pincus Approximate entropy (ApEn) as a complexity measure. , 1995, Chaos.

[7]  Yi Mu,et al.  Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Sotiris Pavlopoulos,et al.  Multiple Image Watermarking Applied to Health Information Management , 2006, IEEE Transactions on Information Technology in Biomedicine.

[9]  J Zhang,et al.  PREDICTING LOW-DIMENSIONAL CHAOTIC TIME SERIES USING VOLTERRA ADAPTIVE FILERS , 2000 .

[10]  Sen Zhang,et al.  Global prediction for chaotic time series based on continued fractions , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[11]  Yuen Ching-Hung,et al.  Chaos-based encryption for fractal image coding , 2012 .

[12]  Nanning Zheng,et al.  An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection , 2011, Signal Process. Image Commun..

[13]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[14]  孙福艳,et al.  Digital image encryption with chaotic map lattices , 2011 .

[15]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[16]  Nicolae Vizireanu,et al.  Robust wavelet-based video watermarking scheme for copyright protection using the human visual system , 2011, J. Electronic Imaging.

[17]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .