Research Article
BibTex RIS Cite

Sayisal İmgeler için Yeni Bir Hizli Lojistik Kimlik Doğrulama Yöntemi

Year 2017, Volume: 1 Issue: 1, 27 - 30, 30.06.2017

Abstract

İmgelerde kimlik doğrulamak için sıklıkla kullanılan yöntemlerden biriside kırılgan damgalama yöntemleridir. Bu makalede lojistik harita fonksiyonunu kullanan yeni bir imge kimlik doğrulama (LİK) yöntemi önerilmiştir. Önerilen yöntem damga üretme, damga gizleme, damga çıkarma ve saldırı tespit aşamalarından oluşmaktadır. LİK yönteminde pikseller 3 gruba ayrılır. En anlamlı 2 grup damga üretmek için kullanılır. En anlamsız grup ise damga gömme işleminde kullanılmaktadır. Bu çalışmada, damga gömmek için LSB (Least Significant Bit, En anlamsız bit) ve 2LSBs kullanılmıştır. LİK yönteminin performansını test edebilmek için çalışma zamanı, görsel kalite ve saldırı tespiti yetenekleri kullanılmıştır. Saldırı tespiti yeteneğini ölçmek için, medyan filtre, JPEG sıkıştırma, ortalama filtre, döndürme atakları, gürültü ekleme, kolaj saldırıları kullanılmıştır. Elde edilen sonuçlar, deneysel sonuçlarda sunulmuştur. Deneysel sonuçlar, önerilen yöntemin hızlı ve başarılı bir yöntem olduğunu göstermektedir.

References

  • [1] Y. Xiang, S. Guo, W. Zhou, S. Nahavandi, Patchwork-based audio watermarking method robust to de-synchronization attacks, IEEE/ACM Trans. Audio Speech Lang. Process. 22 (9) (2014) 1413–1423.
  • [2] A. Akter, N. E-Tajnina, M.A. Ullah, Digital image watermarking based on DWT-DCT: evaluate for a new embedding algorithm, in: Third Int. Conf. On Informatics, Electronics & Vision, May, Dhaka,Bangladesh, 2014, pp. 1–6.
  • [3] Q. Su, Y. Niu, Q. Wang, G. Sheng, A blind color image watermarking based on DC component in thespatial domain, Optik 124 (23) (2013) 6255–6260.
  • [4] C.Y. Lin, S.F. Chang A robust image authentication method distinguish JPEG compression from malicious manipulation, IEEE Trans. Circuits Syst. Video Technol. 11 (2), (2001),153-168.
  • [5] X. Qi, X. Xin, A quantization-based semi-fragile watermarking scheme for image content authentication, J. Vis. Commun. Image Represent. 22 (2) (2011), 187-200.
  • [6] Y.-C. Hu, C.-C. Lo, W.-L. Chen, Probability-based reversible image authentication scheme for image demosaicking, Future Generation Computer Systems 62 (2016), 92-103.
  • [7] T. Tuncer, D. Avci, E. Avci, A new data hiding algorithm based on minesweeper game for binary images, Journal of The Faculty of Engineering and Architecture of Gazi University 31.4 (2016): 951-959.
  • [8] L. Yuan, Q. Ran, T. Zhao, Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain, Optics & Laser Technology 88 (2017) 111–120.
  • [9] X. Li, X. Meng, Y. Yin, X. Yang, Y. Wang, X. Peng, W. He, X. Pan, G. Dong, H. Chen, Hierarchical multilevel authentication system for multiple-image based on phase retrieval and basic vector operations, Optics and Lasers in Engineering 89 (2017) 59–71.
  • [10] C. Qin, X. Chen, D. Ye, J. Wang, X. Sun, A novel image hashing scheme with perceptual robustness using block truncation coding, Information Sciences, 361-362, pp. 84-99, 2016.

A Novel Fast Logıitic Authentication Method for Digital Images

Year 2017, Volume: 1 Issue: 1, 27 - 30, 30.06.2017

Abstract

One of
the most used methods for image authentication is fragile watermarking. In this
article, a novel logistic image authentication (LIA) method is proposed that
uses the logistic map function. The proposed method consists of watermark
generation, watermark embedding, watermark extraction and tamper detection
stages. In the LIA method, the pixels are divided into 3 groups. The most
significant 2 groups are used to generate watermark. The most meaningless group
is used for watermark embedding. In this study, LSB (Least Significant Bit) and
2LSBs data hiding functions are used to watermark embedding. Execution time, visual
quality and tamper detection capabilities are used to test the performance of
the proposed LIK method. Median filter, JPEG compression, average filter,
rotation attacks, noise addition, collage attacks are used to measure tamper
detection capacity. The obtained results are presented in experimental results
by using LIK. Experimental results show that the proposed method is a fast and
successful method.

References

  • [1] Y. Xiang, S. Guo, W. Zhou, S. Nahavandi, Patchwork-based audio watermarking method robust to de-synchronization attacks, IEEE/ACM Trans. Audio Speech Lang. Process. 22 (9) (2014) 1413–1423.
  • [2] A. Akter, N. E-Tajnina, M.A. Ullah, Digital image watermarking based on DWT-DCT: evaluate for a new embedding algorithm, in: Third Int. Conf. On Informatics, Electronics & Vision, May, Dhaka,Bangladesh, 2014, pp. 1–6.
  • [3] Q. Su, Y. Niu, Q. Wang, G. Sheng, A blind color image watermarking based on DC component in thespatial domain, Optik 124 (23) (2013) 6255–6260.
  • [4] C.Y. Lin, S.F. Chang A robust image authentication method distinguish JPEG compression from malicious manipulation, IEEE Trans. Circuits Syst. Video Technol. 11 (2), (2001),153-168.
  • [5] X. Qi, X. Xin, A quantization-based semi-fragile watermarking scheme for image content authentication, J. Vis. Commun. Image Represent. 22 (2) (2011), 187-200.
  • [6] Y.-C. Hu, C.-C. Lo, W.-L. Chen, Probability-based reversible image authentication scheme for image demosaicking, Future Generation Computer Systems 62 (2016), 92-103.
  • [7] T. Tuncer, D. Avci, E. Avci, A new data hiding algorithm based on minesweeper game for binary images, Journal of The Faculty of Engineering and Architecture of Gazi University 31.4 (2016): 951-959.
  • [8] L. Yuan, Q. Ran, T. Zhao, Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain, Optics & Laser Technology 88 (2017) 111–120.
  • [9] X. Li, X. Meng, Y. Yin, X. Yang, Y. Wang, X. Peng, W. He, X. Pan, G. Dong, H. Chen, Hierarchical multilevel authentication system for multiple-image based on phase retrieval and basic vector operations, Optics and Lasers in Engineering 89 (2017) 59–71.
  • [10] C. Qin, X. Chen, D. Ye, J. Wang, X. Sun, A novel image hashing scheme with perceptual robustness using block truncation coding, Information Sciences, 361-362, pp. 84-99, 2016.
There are 10 citations in total.

Details

Journal Section Articles
Authors

Türker Tuncer This is me

Publication Date June 30, 2017
Submission Date July 7, 2017
Published in Issue Year 2017 Volume: 1 Issue: 1

Cite

APA Tuncer, T. (2017). A Novel Fast Logıitic Authentication Method for Digital Images. International Journal of Innovative Engineering Applications, 1(1), 27-30.
AMA Tuncer T. A Novel Fast Logıitic Authentication Method for Digital Images. IJIEA. June 2017;1(1):27-30.
Chicago Tuncer, Türker. “A Novel Fast Logıitic Authentication Method for Digital Images”. International Journal of Innovative Engineering Applications 1, no. 1 (June 2017): 27-30.
EndNote Tuncer T (June 1, 2017) A Novel Fast Logıitic Authentication Method for Digital Images. International Journal of Innovative Engineering Applications 1 1 27–30.
IEEE T. Tuncer, “A Novel Fast Logıitic Authentication Method for Digital Images”, IJIEA, vol. 1, no. 1, pp. 27–30, 2017.
ISNAD Tuncer, Türker. “A Novel Fast Logıitic Authentication Method for Digital Images”. International Journal of Innovative Engineering Applications 1/1 (June 2017), 27-30.
JAMA Tuncer T. A Novel Fast Logıitic Authentication Method for Digital Images. IJIEA. 2017;1:27–30.
MLA Tuncer, Türker. “A Novel Fast Logıitic Authentication Method for Digital Images”. International Journal of Innovative Engineering Applications, vol. 1, no. 1, 2017, pp. 27-30.
Vancouver Tuncer T. A Novel Fast Logıitic Authentication Method for Digital Images. IJIEA. 2017;1(1):27-30.