2015
DOI: 10.1002/sec.1365
|View full text |Cite
|
Sign up to set email alerts
|

Image forgery detection in contourlet transform domain based on new chaotic cellular automata

Abstract: Image authentication includes techniques that detect unauthorized changes in digital pictures. Image authentication is generally categorized into two primary categories, active and passive methods. In this paper, a new active image authentication method is proposed for tamper detection based on contourlet transform. Cellular automata and ‘Game of Life’ are also used to improve the detection of tampered area. A pseudo‐random number generator based on cellular automata has been used to improve security of propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 49 publications
(51 reference statements)
0
1
0
Order By: Relevance
“…Knowing the importance of image forensic techniques, researchers have contributed a lot in the same field for the last few decades (Spagnolo and De Santis, 2011). To deal with security weaknesses and adding the concept of cryptography in the production of the authentication sequence, a 3D quantum chaos map (Barani et al, 2015(Barani et al, , 2019 has been used to boost the algorithm key length. The weakness of digital watermarking (Cox et al, 2002;Katzenbeisser and Petitcolas, 2000) is that a watermark must be introduced at the time of recording, which limits this technique to specifically equipped digital cameras (Farid, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…Knowing the importance of image forensic techniques, researchers have contributed a lot in the same field for the last few decades (Spagnolo and De Santis, 2011). To deal with security weaknesses and adding the concept of cryptography in the production of the authentication sequence, a 3D quantum chaos map (Barani et al, 2015(Barani et al, , 2019 has been used to boost the algorithm key length. The weakness of digital watermarking (Cox et al, 2002;Katzenbeisser and Petitcolas, 2000) is that a watermark must be introduced at the time of recording, which limits this technique to specifically equipped digital cameras (Farid, 2009).…”
Section: Introductionmentioning
confidence: 99%