A Fragile Watermarking Chaotic Authentication Scheme Based on Fuzzy C-Means for Image Tamper Detection

Author(s):  
Kamal Hamouda ◽  
Mohammed Mahfouz Elmogy ◽  
B. S. El-Desouky

In the last two decades, several fragile watermarking schemes have been proposed for image authentication. In this paper, a novel fragile watermarking authentication scheme based on Chaotic Maps and Fuzzy C-Means (FCM) clustering technique is proposed. In order to raise the value of the tamper localization, detection accuracy, and security of the watermarking system the hybrid technique between Chaotic maps and FCM are introduced. In addition, this scheme can be applied to any image with different sizes not only in the square or even sized images. The proposed scheme gives high values especially in security because the watermarks pass through two levels to ensure security. Firstly, The FCM clustering technique makes the watermark dependent on the plain image. Secondly, the Chaotic maps are sensitive to initial values. Experimental results show that the proposed scheme achieves superior tamper detection and localization accuracy under different attacks.

2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


Sign in / Sign up

Export Citation Format

Share Document