Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Chaotic Maps Based Scheme for Image Authentication


Affiliations
1 Department of CSE, JNTUH, Hyderabad, Telangana, India
     

   Subscribe/Renew Journal


In this paper a watermarking scheme for image authentication using the chaotic maps is proposed. Depending on the contents of the 2 x 2 image block, Arnold’s Cat map iterations are used to generate the block authentication watermark bits. As the authentication bits are block content dependent, any changes to the content affects the authentication bits. The watermark bits are then embedded in the 3 LSBs of the block. The experimental results show that the tamper localisation capacity of the scheme under various attacks such as object insertion, deletion and vector quantization attacks is superior to some of the recently proposed schemes.

Keywords

Digital Watermarking, Fragile Watermarking, Image Authentication, Tamper Localization.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 268

PDF Views: 2




  • Chaotic Maps Based Scheme for Image Authentication

Abstract Views: 268  |  PDF Views: 2

Authors

Karanam Sreenivas
Department of CSE, JNTUH, Hyderabad, Telangana, India
V. Kamakshiprasad
Department of CSE, JNTUH, Hyderabad, Telangana, India

Abstract


In this paper a watermarking scheme for image authentication using the chaotic maps is proposed. Depending on the contents of the 2 x 2 image block, Arnold’s Cat map iterations are used to generate the block authentication watermark bits. As the authentication bits are block content dependent, any changes to the content affects the authentication bits. The watermark bits are then embedded in the 3 LSBs of the block. The experimental results show that the tamper localisation capacity of the scheme under various attacks such as object insertion, deletion and vector quantization attacks is superior to some of the recently proposed schemes.

Keywords


Digital Watermarking, Fragile Watermarking, Image Authentication, Tamper Localization.