Abstract
In the last two decades, different watermarking schemes are proposed for image authentication and copyright protection. The accuracy of both tamper detection and localization are considered as two important aspects of authentication of watermarking schemes. In this paper, a novel hybrid Chaos and Fuzzy C-Means (FCM) clustering technique is proposed for watermarking authentication. The proposed technique is used to improve the security of the watermarking system and it can be applied to any image with different sizes. The Chaotic maps are sensitive to initial values, so watermark can’t be established without the same initial values. Therefore, it gives high security to scheme. The Fuzzy C-Means clustering technique is used to make the watermark dependent on the plain image. The experimental results show that the proposed scheme achieves superior tamper detection and localization accuracies under different types of image attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU - Int. J. Electron. Commun. 65, 840–847 (2011)
Chen, Y.-L., Yau, H.-T., Yang, G.-J.: A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection. Entropy 15, 3170–3185 (2013)
Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for images. In: Proceedings of the International Conference on Image Processing 2000, vol. 1, pp. 446–449 (2000)
NesaKumari, G.R., Maruthuperumal, S.: Normalized Image Watermarking Scheme Using Chaotic System. Int. J. Inf. Netw. Secur. IJINS 1, 255–264 (2012)
Chen, W.-C., Wang, M.-S.: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36, 1300–1307 (2009)
Di Martino, F., Sessa, S.: Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf. Sci. 195, 62–90 (2012)
Suthaharan, S.: Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. EURASIP J. Inf. Secur. 2010, 1–7 (2010)
Tong, X., Liu, Y., Zhang, M., Chen, Y.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28, 301–308 (2013)
Li, J., Chen, L.: A Digital Watermarking Algorithm Based on Chaos in Interpolatory Orthogonal Multiwavelets Domain. Comput. Inf. Sci. 6 (2013)
Teng, L., Wang, X., Wang, X.: Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU - Int. J. Electron. Commun. 67, 540–547 (2013)
Dawei, Z., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22, 47–54 (2004)
Zhang, C., Wang, J., Wang, X.: Digital Image Watermarking Algorithm with Double Encryption by Arnold Transform and Logistic. In: Fourth International Conference on Networked Computing and Advanced Information Management, NCM 2008, pp. 329–334 (2008)
Ahmad, M., Gupta, C., Varshney, A.: Digital image encryption based on chaotic map for secure transmission. In: International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, pp. 292–295 (2009)
Persohn, K.J., Povinelli, R.J.: Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons Fractals 45, 238–245 (2012)
Bezdek, J.C.: Pattern recognition with fuzzy objective function algorithms. Kluwer Academic Publishers (1981)
Dunn, J.C.: A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters. J. Cybern. 3, 32–57 (1973)
El Bakrawy, L.M., Ghali, N., Ella Hassanien, A., Kim, T.: A rough k-means fragile watermarking approach for image authentication. In: 2011 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 19–23 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hamouda, K., Elmogy, M., El-Desouky, B.S. (2014). A Hybrid Chaos and Fuzzy C-Means Clustering Technique for Watermarking Authentication. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-13461-1_17
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13460-4
Online ISBN: 978-3-319-13461-1
eBook Packages: Computer ScienceComputer Science (R0)