一种基于混沌映射和模糊均值聚类技术的脆弱水印认证方案

K. Hamouda, Mohammed M Elmogy, B. El-Desouky
{"title":"一种基于混沌映射和模糊均值聚类技术的脆弱水印认证方案","authors":"K. Hamouda, Mohammed M Elmogy, B. El-Desouky","doi":"10.1109/ICCES.2014.7030967","DOIUrl":null,"url":null,"abstract":"In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In this paper, a novel watermarking authentication technique based on Chaos and Fuzzy C-Means clustering is proposed for images of different sizes. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. The proposed hybrid technique is used to improve the tamper localization, detection accuracy, and security of the watermarking system. Fuzzy C-Means clustering technique creates the relationship between image blocks to improve the tamper localization and detection accuracy. It also makes the watermark dependent on the plain image to improve the security of the watermarking system. Chaotic maps are sensitive to initial values, so watermark cannot be established without the same initial values. Then, it gives high security to the proposed watermarking scheme. The proposed scheme not deals with square or even sized images, but it can deals with any images with different sizes. Experimental results show that the proposed scheme is checked through a series of attacks and achieve superior tamper detection and localization accuracy under different attacks.","PeriodicalId":339697,"journal":{"name":"2014 9th International Conference on Computer Engineering & Systems (ICCES)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A fragile watermarking authentication schema based on Chaotic maps and fuzzy cmeans clustering technique\",\"authors\":\"K. Hamouda, Mohammed M Elmogy, B. El-Desouky\",\"doi\":\"10.1109/ICCES.2014.7030967\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In this paper, a novel watermarking authentication technique based on Chaos and Fuzzy C-Means clustering is proposed for images of different sizes. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. The proposed hybrid technique is used to improve the tamper localization, detection accuracy, and security of the watermarking system. Fuzzy C-Means clustering technique creates the relationship between image blocks to improve the tamper localization and detection accuracy. It also makes the watermark dependent on the plain image to improve the security of the watermarking system. Chaotic maps are sensitive to initial values, so watermark cannot be established without the same initial values. Then, it gives high security to the proposed watermarking scheme. The proposed scheme not deals with square or even sized images, but it can deals with any images with different sizes. Experimental results show that the proposed scheme is checked through a series of attacks and achieve superior tamper detection and localization accuracy under different attacks.\",\"PeriodicalId\":339697,\"journal\":{\"name\":\"2014 9th International Conference on Computer Engineering & Systems (ICCES)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 9th International Conference on Computer Engineering & Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2014.7030967\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 9th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2014.7030967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

近年来,针对图像认证和版权保护提出了不同的水印方案。提出了一种基于混沌和模糊c均值聚类的不同尺寸图像水印认证方法。篡改定位和检测精度是认证水印方案的两个重要方面。该混合技术可提高水印系统的篡改定位、检测精度和安全性。模糊c均值聚类技术通过建立图像块之间的关系来提高篡改定位和检测精度。该方法还使水印依赖于平面图像,提高了水印系统的安全性。混沌映射对初始值很敏感,没有相同的初始值就无法建立水印。同时,该方案具有较高的安全性。提出的方案不处理正方形或均匀大小的图像,但它可以处理任何不同大小的图像。实验结果表明,该方案经过了一系列攻击的检验,在不同攻击下均具有较好的篡改检测和定位精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A fragile watermarking authentication schema based on Chaotic maps and fuzzy cmeans clustering technique
In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In this paper, a novel watermarking authentication technique based on Chaos and Fuzzy C-Means clustering is proposed for images of different sizes. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. The proposed hybrid technique is used to improve the tamper localization, detection accuracy, and security of the watermarking system. Fuzzy C-Means clustering technique creates the relationship between image blocks to improve the tamper localization and detection accuracy. It also makes the watermark dependent on the plain image to improve the security of the watermarking system. Chaotic maps are sensitive to initial values, so watermark cannot be established without the same initial values. Then, it gives high security to the proposed watermarking scheme. The proposed scheme not deals with square or even sized images, but it can deals with any images with different sizes. Experimental results show that the proposed scheme is checked through a series of attacks and achieve superior tamper detection and localization accuracy under different attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Simulations and performance evaluation of Real-Time Multi-core Systems An Enhanced Queries Scheduler for query processing over a cloud environment EMD thresholding and denoising inspired by wavelet technique A proposed SNOMED CT ontology-based encoding methodology for diabetes diagnosis case-base A proposed framework for robust face identification system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1