Computer Science ›› 2020, Vol. 47 ›› Issue (10): 332-338.doi: 10.11896/jsjkx.191000060

• Information Security • Previous Articles    

Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm

ZHENG Qiu-mei, LIU Nan, WANG Feng-hua   

  1. College of Computer Science and Technology,China University of Petroleum Huadong,Qingdao,Shandong 266580,China
  • Received:2019-10-12 Revised:2020-03-08 Online:2020-10-15 Published:2020-10-16
  • About author:ZHENG Qiu-mei,born in 1964,postgraduate,professor,postgraduate supervisor.Her main research interests include digital watermarking and image processing.
    LIU Nan,born in 1996,postgraduate.Her main research interests includeima-ge processing and digital image watermarking.
  • Supported by:
    National Natural Science Foundation of China (51274232),Natural Science Foundation of Shandong Province,China (ZR2018MEE004) and Fundamental Research Funds for the Central Universities of Ministry of Education of China (19CX02030A)

Abstract: When the image is used in judicial,medical and other importantfields,it is often necessary to authenticate the integrity of the image to determine whether the image have been tampered with maliciously.The authentication method of image integrity based on fragile watermarking can be used to detect and locate the image tampering.In order to solve the problem that the localization accuracy and anti-complex attacks of fragile watermarking in image tamper detection can not be satisfied simultaneously,a complex attack based fragile watermarking for image integrity authentication algorithm is proposed in this paper.The fragile watermarking is embedded into the color image’s R,G and B channels to detect any channel tampering.In order to improve the localization accuracy,2 × 2 image blocks are divided.Block authentication and group authentication are used to detect the image tampering of complex attacks,and non-equilateral image scrambling transformation is used to improve the universality and anti-complex attacks ability of the algorithm.The simulation results show that the proposed algorithm has better invisibility and higher localization accuracy for image tampering under common attacks,complex attacks and multi attacks.

Key words: Complex attack, Fragile watermarking, Imagetampering, Localization accuracy, Tamper detection

CLC Number: 

  • TP309
[1]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,28(5):1047-1055.
[2]TIWARI A,SHARMA M,TAMRAKAR R K.Watermarkingbased image authentication and tamper detection algorithm using vector quantization approach[J].International Journal of Electronics and Communications(AEU),2017(78):114-123.
[3]ZHAN X,LI Y,LEI Y R,Chen C R.A grayscale images fragile watermark authentication system based on the singular value decomposition[J].Journal of Inner Mongolia University (Natural Science Edition),2015,44(3):385-388.
[4]SHI J P,WU Y Q.Fragile watermarking for fingerprint images based on QR decomposition in NSCT-Domain[J].Journalof Applied Science-Electronics and Information Engineering,2017,35(6):735-744.
[5]JING X Z,JIANG W Z.Fragile watermarking capable of locating tampered blocks in JPEG images[J].ACTA ELECTRONICA SINICA,2010,38(7):1585-1589.
[6]ANSARI I A,PANT M,AHN C W.SVD based fragile watermarking scheme for tamper localization and self-recovery[J].International Journal of Machine Learning and Cybernetics,2016,7(6):1225-1239.
[7]YEUNG M M,MINTZER F.An invisible watermarking tech-nique for image verification[C]//Proceedings of theICIP’97.Santa Barbara,California:IEEE,1997:680-683.
[8]CHEN F,WANG H X.Secure fragile watermarking algorithm with tampered-pixels localization[J].Journal of the China Railway Society,2011,33(1):63-68.
[9]MUNIR R.A chaos-based fragile watermarking method in spatial domain for image authentication[C]//2015 International Seminar on Intelligent Technology and Its Applications (ISITIA).IEEE,2015.
[10]TONG X,LIU Y,ZHANG M,et al.A novel chaos-based fragile watermarking for image tampering detection and self-recovery[J].Signal Processing:Image Communication,2013,28(3):301-308.
[11]KANG Q,KE L,HU C.An SVD-based fragile watermarkingscheme with grouped blocks[C]//2nd International Conference on Information Technology and Electronic Commerce (ICITEC).IEEE,2014.
[12]SHAO L P,QIN Z,GAO H J,et al.2-Dimension non equilateral image scrambling transformation[J].Acta Electronica Sinica,2007,35(7):1290-1294.
[13]LI Y K,FENG Q S,ZHOU F,et al.2-D Arnold transformation and non-equilateral image scrambling transformation[J].Computer Engineering and Design,2009,30(13):3133-3135.
[14]ANSARI I A,PANT M.Multipurpose image watermarking in the domain of DWT based on SVD and ABC[J].Pattern Recognition Letters,2016,16(94):228-236.
[15]SHEHAB A,ELHOSENY M,MUHAMMAD K,et al.Secureand robust fragile watermarking scheme for medical images[J].IEEE Access,2018,6:10269-10278.
[16]ZHOU W,YU L,WANG Z,et al.Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images[J].International Journal of Electronics and Communications(AEU),2015,70(1):77-84.
[17]SHI H,LI M C,GUO C,et al.A region-adaptive semi-fragiledual watermarking scheme[J].Multimedia Tools and Applications,2016,75(1):465-495.
[18]TRIVEDY S,PAL A K.A Logistic map-based fragile water-marking scheme of digital images with tamper detection[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2017,41:103-113.
[19]ZHANG H.Research on fragile watermarking schemes for image content authentication and self-recovery[D].Weihai:Shandong University,2018.
[20]XIE G X.Self-recovery fragile watermarking algorithm for image content authentication[D].Chengdu:Southwest Jiaotong University,2017.
[1] TIAN Yang, BI Xiu-li, XIAO Bin, LI Wei-sheng, MA Jian-feng. Image Seam Carving Tampering Detection by Discrete Tchebichef Transform [J]. Computer Science, 2021, 48(6A): 43-50.
[2] SUI Li-li and WANG Chuan-jian. Checking Topological Integrity of Geographic Data Based on Fragile Watermarking [J]. Computer Science, 2016, 43(2): 183-187.
[3] CUI Wen-cheng, LIANG Shuang-shuang, SHAO Hong and WANG Hai-yu. Research on Detection of Image Region-duplication Forgery Affected by Intrinsically Identical Objects [J]. Computer Science, 2015, 42(Z6): 226-230.
[4] . Research and Design of Multimedia Digital Products Copyright Protection Model [J]. Computer Science, 2013, 40(1): 98-102.
[5] XIAO Lei. Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types [J]. Computer Science, 2010, 37(2): 286-289.
[6] . [J]. Computer Science, 2008, 35(1): 258-260.
[7] . [J]. Computer Science, 2007, 34(12): 252-256.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!