DocumentCode
256446
Title
A fragile watermarking authentication schema based on Chaotic maps and fuzzy cmeans clustering technique
Author
Hamouda, K. ; Elmogy, M. ; El-Desouky, B.S.
Author_Institution
Dept. of Math., Mansoura Univ., Mansoura, Egypt
fYear
2014
fDate
22-23 Dec. 2014
Firstpage
245
Lastpage
252
Abstract
In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In this paper, a novel watermarking authentication technique based on Chaos and Fuzzy C-Means clustering is proposed for images of different sizes. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. The proposed hybrid technique is used to improve the tamper localization, detection accuracy, and security of the watermarking system. Fuzzy C-Means clustering technique creates the relationship between image blocks to improve the tamper localization and detection accuracy. It also makes the watermark dependent on the plain image to improve the security of the watermarking system. Chaotic maps are sensitive to initial values, so watermark cannot be established without the same initial values. Then, it gives high security to the proposed watermarking scheme. The proposed scheme not deals with square or even sized images, but it can deals with any images with different sizes. Experimental results show that the proposed scheme is checked through a series of attacks and achieve superior tamper detection and localization accuracy under different attacks.
Keywords
chaos; copy protection; fuzzy set theory; image watermarking; message authentication; pattern clustering; authentication watermarking scheme; chaotic maps; copyright protection; detection accuracy; fuzzy c-means clustering technique; image authentication; image block; localization accuracy; tamper localization; watermarking authentication schema; watermarking authentication technique; watermarking schemes; watermarking system security; Accuracy; Chaotic map; Digital watermarking; Fuzzy C-Means (FCM) clustering; Image authentication; Tamper detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Engineering & Systems (ICCES), 2014 9th International Conference on
Conference_Location
Cairo
Print_ISBN
978-1-4799-6593-9
Type
conf
DOI
10.1109/ICCES.2014.7030967
Filename
7030967
Link To Document