Fractal and neural networks based watermark identification
Multimedia Tools and Applications
Multiple Image Watermarking Applied to Health Information Management
IEEE Transactions on Information Technology in Biomedicine
Chaotic Watermarking for Video Authentication in Surveillance Applications
IEEE Transactions on Circuits and Systems for Video Technology
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
To improve the robustness to combined attack of signal processing plus tamper, a composite chaos-based lossless scheme for image authentication and tamper localization is proposed. A non-successive composite chaos (NSCC) is described, and its performance is analysed by some evaluation indicators. Then NSCC is employed to disturb original image and generate chaotic logo, which enhances the security and robustness of lossless image authentication scheme due to the good performance of NSCC in these aspects of randomness, complexity and ability of anti-forecast technology. Experimental results demonstrate that the proposed scheme is not only safe, but also realizes the correct extraction of logo and precise detection of tampered region position and shape under various attacks, especially signal processing plus tamper attack.