Title :
Chaotic watermarking scheme for authentication of JPEG Images
Author :
Wang, Hongxia ; Ding, Ke ; Liao, Changxing
Author_Institution :
Sch. of Inf. Sci. & Technol., Southwest Jiaotong Univ., Chengdu
Abstract :
-With developing of computer networks and digital techniques, the electronic image are easily created, edited, reproduced and distributed. Unfortunately, illegal copy and malicious tamper are also facilitated. At present, fragile watermark is researched greatly to authenticate the veracity and integrity of electronic contents. In this paper, a chaotic watermarking scheme for authentication of popular JPEG images is proposed. The quantized DCT ( Discrete Cosine Transform ) coefficients after entropy decoding are mapped to the initial values of the chaotic system, then the generated watermark information by chaotic iteration is embedded into JPEG compressed domain. Thanks to the high sensitivity on initial values of the chaotic mapping, the very accurate localization is realized for the malicious tampers to JPEG images. Because we directly modify the DCT coefficients after quantization for embedding the watermark, the proposed method can prevent the invalidation of tamper detection by JPEG re-quantization. Furthermore, because the proposed scheme avoids a large of computation on full decoding and re-encoding process, the low complexity and a high extracting speed are obtained. Simulation results show the proposed scheme can directly localize the tampers happened on the watermarked JPEG images. Furthermore, the ability of tamper localization is very sensitivity. So the proposed scheme is very fit for the integrity authentication of the electronic image in Internet.
Keywords :
chaotic communication; discrete cosine transforms; image coding; watermarking; DCT coefficients; Internet; JPEG images authentication; chaotic iteration; chaotic watermarking scheme; discrete cosine transform; electronic image; entropy decoding; illegal copy; malicious tamper; re-encoding process; Authentication; Chaos; Computer networks; Discrete cosine transforms; Entropy; Image coding; Iterative decoding; Quantization; Transform coding; Watermarking; DCT; authentication; chaotic mapping; compressed domain; fragile watermarking;
Conference_Titel :
Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on
Conference_Location :
Islamabad
Print_ISBN :
978-1-4244-2427-6
DOI :
10.1109/ISBAST.2008.4547641