Opto-Electronic Engineering, Volume. 35, Issue 9, 138(2008)

Fragile Authentication Watermark Based on Singular Value Decomposition and Chaotic Mapping

YE Tian-yu*, NIU Xin-xin, and YANG Yi-xian
Author Affiliations
  • [in Chinese]
  • show less

    An image fragile authentication watermark algorithm based on singular value decomposition and chaotic mapping was proposed, trying to apply chaotic mapping’s initial value sensitivity to tamper detection. Singular value decomposition was carried out on each image block, and authentication watermark was produced by using Logistic chaotic mapping. Then Logistic chaotic mapping was used to design a mapping function defined on two separate blocks, and authentication watermark sequence was embedded into the corresponding mapping block’s LSB. The experimental results show that the algorithm is not only very sensitive to tamper, but also resists collage attack and distinguishes image content tamper from watermark tamper.

    Tools

    Get Citation

    Copy Citation Text

    YE Tian-yu, NIU Xin-xin, YANG Yi-xian. Fragile Authentication Watermark Based on Singular Value Decomposition and Chaotic Mapping[J]. Opto-Electronic Engineering, 2008, 35(9): 138

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Dec. 29, 2007

    Accepted: --

    Published Online: Mar. 1, 2010

    The Author Email: Tian-yu YE (flystu008@tom.com)

    DOI:

    CSTR:32186.14.

    Topics