Image Processing Reference
In-Depth Information
Figure 7.2 shows the block diagram of the proposed method and Figure 7.3 illus-
trates the diagram of the proposed cellular automata to create a cipher key, based on
statistical information of the L and U matrices.
The embedding algorithm in a spatial domain of the original image will be de-
scribedindetailasfollows:
Data Embedding Algorithm
Input: grayscale image to apply data embedding to it for forgery detection.
Output: .PNG grayscale image file.
Step1: Open the original image and get the corresponding matrix form of that.
We know that a matrix is the certain underlying object of each digital image.
Step2: Perform the LU decomposition and obtain L and U matrices.
Step3: Calculate the statistical information for each L and U matrices separately,
converting them to binary, and create the array list as the input values of the cellular
automata.
Step 4: Zero padding to apply the rule to the boundaries.
Step5: Perform the cellular automata rule according to the Table 7.2. This rule
performs on the array list to create a cipher key. (This step describes in detail in the
following section: Forgery Detection Algorithm)
Step6: Convert the cipher keys to the binary representation.
Step7: Select the first eight pixels in the original image and embed the binary
sequences of cipher key into the LSB of these eight pixels.
The forgery detection algorithm will be as follows:
Forgery Detection Algorithm
Input: .PNG image that contains the cipher key.
Output: Digital image forgery detection ALARM.
Step1: Open the .PNG input image and make corresponding digital image matrix.
Step2: initial integer variable CipherValue to zero.
Step3: initial integer variable PixelArrayValue to zero.
Step4: Perform the LU decomposition and obtain L and U matrices.
Step5: Calculate the statistical information for each L and U matrices separately
and create the array list of these values.
Step6: Perform the cellular automata rule according to the Table 7.3. This rule
performs on the array list to create a cipher key.
Step7: Select the first eight pixels of the image and extract the LSB binary value
of pixels.
Step8: set CipherValue = value of the cipher key that generated in Step 6.
Step9: set PixelArrayValue = the extraction value in Step 7.
Step10: If PixelArrayValue = = CipherValue then print message 'False Forgery
Alarm'
Else
Print message 'True Forgery Alarm';
 
Search WWH ::




Custom Search