Enter your keyword

2-s2.0-85026778759

[vc_empty_space][vc_empty_space]

A fragile watermarking scheme for authentication of GIF images

Munir R.a

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2017, School of Electrical Engineering and Informatics. All rights reserved.Fragile image watermarking could be used to authenticate a digital image due to modification or altering. A watermark is embedded into the image. When the image was modified or altered, the watermark is also altered or fragile. One of popular image format is GIF image. Some fragile watermarking algorithms are applied to the single GIF image only, none for animated images. However, we could modify the existing steganography algorithm to build a fragile watermarking scheme for any kind of GIF images (still images or animated images). In this paper, we reused EzStego to embed a watermark into the GIF images. EzStego is a steganography algorithm especially for hiding the message in the palette images such as the GIF images. The watermark, which is a binary image, is inserted into a GIF image based on EzStego embeddeing scheme. For increasing security, the watermark is encrypted with the random bits based on chaos system before embedding. To prove authentication of the image, the watermark is extracted from the watermarked image based on EzStego extraction scheme and then compare it with the original watermark. The fragile watermark indicates that the image has been altered. We also could find parts of the image that has been altered. We have tested the performance of the proposed scheme by doing some typical attacks to the watermarked images. Based on experiments results we conclude that the watermarking scheme can detect the authentication of the watermarked images due to the attacks.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Attacks,EzStego algorithm,Fragile watermarking,GIF images,Image authentication[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text]Research that published in this paper is fully funded by a grant for Decentralization of Directorate of Higher Education (DIKTI) with PUPT Scheme, 2016.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.15676/ijeei.2017.9.2.7[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]