Quantum-Dot Cellular Automata based Fragile Watermarking Method for Tamper Detection using Chaos

Full Text (PDF, 592KB), PP.27-32

Views: 0 Downloads: 0

Author(s)

Turker Tuncer 1,* Sengul Dogan 1

1. Digital Forensics Engineering, Technology Faculty, Firat University, Elazig, Turkey

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2018.12.04

Received: 12 Oct. 2018 / Revised: 9 Nov. 2018 / Accepted: 18 Nov. 2018 / Published: 8 Dec. 2018

Index Terms

Fragile watermarking, quantum-dot cellular automata, chaotic maps, tamper detection, information security

Abstract

Fragile watermarking techniques have been widely used in the literature for tampered areas localization and image authentication. In this study, a novel quantum-dot cellular automata based fragile watermarking method for tampered area localization using chaotic piecewise map is proposed. Watermark generation, embedding, extraction and tampered area localization phases are consisted of the proposed quantum dot cellular automata and chaos based fragile watermarking method. In the watermark generation phase, quantum dot cellular automata and piecewise map which is a chaotic map are utilized. A block based method is utilized as authentication values embedding and extraction phases. To detect tampered areas, generated watermark and extracted watermark are compared. Also, block counters are used to tamper detection. In order to evaluate this method, capacity, imperceptibility and image authentication ability were utilized as performance metrics and the results of these metrics clearly illustrated that the presented method is suitable for image authentication and tamper detection.

Cite This Paper

Turker Tuncer, Sengul Dogan, "Quantum-Dot Cellular Automata based Fragile Watermarking Method for Tamper Detection using Chaos", International Journal of Information Technology and Computer Science(IJITCS), Vol.10, No.12, pp.27-32, 2018. DOI:10.5815/ijitcs.2018.12.04

Reference

[1]V. Potdar, S., Han, E. Chang, “A survey of digital image watermarking techniques”. In 3rd IEEE International Conference on Industrial Informatics (INDIN 2005), pp. 709-716, IEEE, 2005.
[2]C. Honsinger, Digital watermarking. Journal of Electronic Imaging, 11(3), 414, 2002.
[3]I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalker, “Digital watermarking and steganography”. Morgan kaufmann, 2007.
[4]S. Dogan, T. Tuncer, E. Avci, A. Gulten, “A robust color image watermarking with Singular Value Decomposition method”. Advances in Engineering Software, 42(6), pp.336-346, 2011.
[5]F. Hartung, B. Girod, “Watermarking of uncompressed and compressed video”. Signal processing, 66(3), pp. 283-301, 1998.
[6]M. Barni, F. Bartolini, V. Cappellini, A. Piva, “A DCT-domain system for robust image watermarking”. Signal processing, 66(3), pp. 357-372, 1998.
[7]C. S. Collberg, C. Thomborson, “Watermarking, tamper-proofing, and obfuscation-tools for software protection”. IEEE Transactions on software engineering, 28(8), pp. 735-746, 2002.
[8]C. W. Tang, H. M. Hang, “A feature-based robust digital image watermarking scheme”. IEEE transactions on signal processing, 51(4), pp. 950-959, 2003.
[9]P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, F. Davoine, “Digital watermarking robust to geometric distortions”. IEEE Transactions on Image Processing, 14(12), pp. 2140-2150, 2005.
[10]S. M. Arora, “A DWT-SVD based Robust Digital Watermarking for Digital Images”. Procedia Computer Science, 132, 1441, 2018.
[11]C. Seetha, S. Goollawattanaporn, C. Tanprasert, “Transparent Digital Watermark on Drug's Images”. Procedia Computer Science, 21, pp. 302-309, 2013.
[12]R. Xie, C. Hong, S. Zhu, D. Tao, “Anti-counterfeiting digital watermarking algorithm for printed QR barcode”. Neurocomputing, 167, 625-635, 2015.
[13]R. Roy, T. Ahmed, S. Changder, “Watermarking through image geometry change tracking”. Visual Informatics, 2018.
[14]M. Moosazadeh, G. Ekbatanifard, “An improved robust image watermarking method using DCT and YCoCg-R color space”. Optik-International Journal for Light and Electron Optics, 140, pp. 975-988, 2017.
[15]M. B. Khosroshahy, M. H. Moaiyeri, S. Angizi, N. Bagherzadeh, K. Navi, “Quantum-dot cellular automata circuits with reduced external fixed inputs”. Microprocessors and Microsystems, 50, pp. 154-163, 2017.
[16]S. Seyedi, N. J. Navimipour, “An optimized design of full adder based on nanoscale quantum-dot cellular automata”. Optik-International Journal for Light and Electron Optics, 158, pp. 243-256, 2018.
[17]Y.F. Wang, M.D. Xie, A.M. Ji, Research on a Piecewise Linear Chaotic Map and Its Cryptographical Application, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 24-27 Aug. 2007, Haikou, China.
[18]T. Tuncer, Y. Sönmez, Block based data hiding method for images, European Journal of Technique, (2017) 7(2) 85-95.
[19]T. Tuncer, A probabilistic image authentication method based on chaos, Multimedia Tools and Applications, 2018, https://doi.org/10.1007/s11042-017-5569-x.
[20]S. K. Lee, Y. H. Suh, Y. S. Ho, Reversiblee image authentication based on watermarking. In Multimedia and Expo, 2006 IEEE International Conference on IEEE, pp. 1321-1324, 2016.
[21]A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform”. IEEE transactions on image processing, 13(8), pp. 1147-1156, 2004.
[22]C.C. Chang, Y.P. Hsieh, C. H. Lin, Sharing secrets in stego images with authentication. Pattern Recogn, 41(10):3130–3137, 2008.
[23]W. C. Wu, Z. W. Lin, SVD-based self-embedding image authentication scheme using quick response code features. J Vis Commun Image R 38:18–28, 2016.
[24]T. Tuncer, A probabilistic image authentication method based on chaos. Multimedia Tools and Applications, 1-18, 2018.