A Watermark Algorithm of Content Authentication for Network Transmission Image Correcting Errors in Terms of Pixels

This paper proposes a watermark algorithm for image content authentication. It can correct errors in terms of pixels for image which transmits via media network and be tampered by noise or others hackers. There are two characteristics: first, aiming at defects of poor safety transferring on networks and the complicated calculation which are exiting in image encryption algorithm based on chaotic sequences, a new image chaotic encryption algorithm based on sampling without replacement is put forward. Second, the application of combination mapping technique supplies a gap which is exiting in image content authentication watermark. Using the authentication, digital image can be corrected in terms of pixels, and with the minimum embedded capacity and the maximum SNR. The image is divided into blocks by 8 × 8, image content authentication and correcting errors is done on blocks. In the scheme, chaotic encryption not only ensures the safety on network transferring, but also advances correcting rate which can make sure the usage of images transferring on network, at the same time it guarantees the validity of network transmission image.

[1]  Hao Wang,et al.  Rational secret sharing with semi-rational players , 2012, Int. J. Grid Util. Comput..

[2]  Pla Information,et al.  An Image Authentication Scheme Separating Tamper Detection from Tamper Location , 2007 .

[3]  Deng Xiao-hen Image encryption algorithms based on chaos through dual scrambling of pixel position and bit , 2014 .

[4]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[5]  Doan B. Hoang,et al.  Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID , 2012, Int. J. Grid Util. Comput..

[6]  W.T. Penzhorn,et al.  Digital watermarking for copyright protection , 2004, 2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590).

[7]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[8]  Liu Bi A New Scheme on Perturbing Digital Chaotic Systems , 2005 .

[9]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[10]  Fatos Xhafa,et al.  A next generation emerging technologies roadmap for enabling collective computational intelligence in disaster management , 2011, Int. J. Space Based Situated Comput..

[11]  Liu Fen-lin An Image Encryption Algorithm Based on Four-value Chaotic Array , 2006 .

[12]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Chen Xiu-hong,et al.  Digital Image Watermarking Algorithm Based on Chaos Encryption and SVD , 2012 .

[14]  Abdelkader H. Ouda,et al.  Localization and security enhancement of block-based image authentication , 2005, IEEE International Conference on Image Processing 2005.

[15]  Yang Yong-tian Image Authentication Scheme Research Based on Fragile Watermarking , 2007 .