Skip to main content

A Hybrid Chaos and Fuzzy C-Means Clustering Technique for Watermarking Authentication

  • Conference paper
Advanced Machine Learning Technologies and Applications (AMLTA 2014)

Abstract

In the last two decades, different watermarking schemes are proposed for image authentication and copyright protection. The accuracy of both tamper detection and localization are considered as two important aspects of authentication of watermarking schemes. In this paper, a novel hybrid Chaos and Fuzzy C-Means (FCM) clustering technique is proposed for watermarking authentication. The proposed technique is used to improve the security of the watermarking system and it can be applied to any image with different sizes. The Chaotic maps are sensitive to initial values, so watermark can’t be established without the same initial values. Therefore, it gives high security to scheme. The Fuzzy C-Means clustering technique is used to make the watermark dependent on the plain image. The experimental results show that the proposed scheme achieves superior tamper detection and localization accuracies under different types of image attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU - Int. J. Electron. Commun. 65, 840–847 (2011)

    Article  Google Scholar 

  2. Chen, Y.-L., Yau, H.-T., Yang, G.-J.: A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Entropy 15, 3170–3185 (2013)

    Article  MathSciNet  Google Scholar 

  3. Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for images. In: Proceedings of the International Conference on Image Processing 2000, vol. 1, pp. 446–449 (2000)

    Google Scholar 

  4. NesaKumari, G.R., Maruthuperumal, S.: Normalized Image Watermarking Scheme Using Chaotic System. Int. J. Inf. Netw. Secur. IJINS 1, 255–264 (2012)

    Google Scholar 

  5. Chen, W.-C., Wang, M.-S.: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36, 1300–1307 (2009)

    Article  Google Scholar 

  6. Di Martino, F., Sessa, S.: Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf. Sci. 195, 62–90 (2012)

    Article  Google Scholar 

  7. Suthaharan, S.: Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. EURASIP J. Inf. Secur. 2010, 1–7 (2010)

    Article  Google Scholar 

  8. Tong, X., Liu, Y., Zhang, M., Chen, Y.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28, 301–308 (2013)

    Article  Google Scholar 

  9. Li, J., Chen, L.: A Digital Watermarking Algorithm Based on Chaos in Interpolatory Orthogonal Multiwavelets Domain. Comput. Inf. Sci. 6 (2013)

    Google Scholar 

  10. Teng, L., Wang, X., Wang, X.: Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU - Int. J. Electron. Commun. 67, 540–547 (2013)

    Article  Google Scholar 

  11. Dawei, Z., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22, 47–54 (2004)

    Article  MATH  Google Scholar 

  12. Zhang, C., Wang, J., Wang, X.: Digital Image Watermarking Algorithm with Double Encryption by Arnold Transform and Logistic. In: Fourth International Conference on Networked Computing and Advanced Information Management, NCM 2008, pp. 329–334 (2008)

    Google Scholar 

  13. Ahmad, M., Gupta, C., Varshney, A.: Digital image encryption based on chaotic map for secure transmission. In: International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, pp. 292–295 (2009)

    Google Scholar 

  14. Persohn, K.J., Povinelli, R.J.: Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons Fractals 45, 238–245 (2012)

    Article  Google Scholar 

  15. Bezdek, J.C.: Pattern recognition with fuzzy objective function algorithms. Kluwer Academic Publishers (1981)

    Google Scholar 

  16. Dunn, J.C.: A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters. J. Cybern. 3, 32–57 (1973)

    Article  MATH  MathSciNet  Google Scholar 

  17. El Bakrawy, L.M., Ghali, N., Ella Hassanien, A., Kim, T.: A rough k-means fragile watermarking approach for image authentication. In: 2011 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 19–23 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hamouda, K., Elmogy, M., El-Desouky, B.S. (2014). A Hybrid Chaos and Fuzzy C-Means Clustering Technique for Watermarking Authentication. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13461-1_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13460-4

  • Online ISBN: 978-3-319-13461-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics