Abstract
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce watermark payloads, while they have high quality of recovery and security. In watermark embedding phase, we process the image in order to produce the information array for each block, which finally embedded in the host image to build watermarked image. The information array for each block has different length, which is defined based on block characteristic that could be smooth or rough. The second superiority of the proposed method is proposing a new metric for calculating roughness of image block, which leads to less consume of bandwidth in comparison with other available methods. Finally, we use chaotic map for block-mapping that enhances the security. Our method provides basic requirements of watermarking scheme such as, invisibility, recover quality and security. Experimental Results have proved that our method is powerful in tamper detection, self-recovery and robust against known watermarking attacks.
Similar content being viewed by others
References
Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):1–12
Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput 71(8):3163–3180
Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl 75(1):181–197
Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst 39(8):1–10
Barani MJ, Ayubi P, Jalili F, Valandar MY, Azariyun E (2015) Image forgery detection in contourlet transform domain based on new chaotic cellular automata. Secur Commun Netw 8(18):4343–4361
Chen B, Shu H, Coatrieux G, Chen G, Sun X, Coatrieux JL (2015) Color image analysis by quaternion-type moments. J Math Imaging Vis 51(1):124–144
Chen F, et al. (2012) Self-recovery fragile watermarking scheme with variable watermark payload, in Digital Forensics and Watermarking. Springer, p 142–155
Chen F et al (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimedia Tools Appl 72(1):41–56
El-Loco G: A few tools to discover hidden data. http://www.guillermito2.net/stegano/tools/index.html
Fridrich J and Goljan M (1999) Protection of digital images using self embedding. In: Symposium on Content Security and Data Hiding in Digital Media. Newark, NJ, USA
Gong L, Liu X, Zheng F, Zhou N (2013) Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. J Mod Opt 60(13):1074–1082
Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285(7):1759–1766
Hwang HE (2012) Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain. Opt Commun 285(5):567–573
Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56–75
Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27
Mollaeefar M, Sharif A, Nazari M (2015) A novel encryption scheme for colored image based on high level chaotic maps. Multimedia Tools Appl 1–23
Nikooghadam M, Jahantigh R, Arshad H (2016) A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools Appl
Provos N and Honeyman P (2001) Detecting steganographic content on the internet. Center for Information Technology Integration
Qian Z et al (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286
Qin C, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150
Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687–2695
Saha C, Hossain MF, Abdullah BS (2016) Improving the security of spatial domain based digital image watermarking using chaotic map and cellular automation. Int J Image Graph Signal Process 8(1):51
Sharif A, Mollaeefar M, Nazari M (2016) A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools Appl 1–19
Singh P and Agarwal S (2016) A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multimedia Tools Appl 1–40
Yang C-W, Shen J-J (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343
Zhang X et al (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495
Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21
Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234–3242
Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nazari, M., Sharif, A. & Mollaeefar, M. An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76, 16107–16123 (2017). https://doi.org/10.1007/s11042-016-3897-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3897-x