Skip to main content

A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP)

  • Conference paper
  • First Online:
Computational Intelligence in Communications and Business Analytics (CICBA 2023)

Abstract

Data communication and transmission through internet has been rapidly increased now a days specially during and after COVID-19 pandemic situation. So, it is essential to preserve multimedia data from outlawed access. Here, a novel approach of fragile watermarking for authentication and tamper detection has been suggested. Firstly, an input image is split up into non-overlapping blocks of sized \(3\times 3\). A reference block has been chosen randomly to get the watermark which is hidden at the LSBs (Least Significant Bits) of the non-reference blocks of input image. The proposed scheme takes the advantage of Local Binary Pattern (LBP) feature of the image which is used to generate the watermark. The proposed scheme maintains high quality watermarked images with 51.68 dB average PSNR and 0.9955 average SSIM. The proposed scheme has been analysed against different attacks like cropping and copy-move forgery which shows 100% Tamper Detection Rate (TDR) for cropping attack and 99.39% for copy-move forgery attack. The presented scheme also exceeds other methods with respect to PSNR and SSIM value as depicted in comparative analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sharma, S., Zou, J.J., Fang, G.: A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities. IEEE Access 10, 85677–85700 (2022)

    Article  Google Scholar 

  2. Jana, M., Jana, B.: An improved data hiding scheme through image interpolation. In: Das, A.K., Nayak, J., Naik, B., Pati, S.K., Pelusi, D. (eds.) Computational Intelligence in Pattern Recognition. AISC, vol. 999, pp. 157–169. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-9042-5_14

    Chapter  Google Scholar 

  3. Qingtang, S., Zhang, X., Wang, H.: A blind color image watermarking algorithm combined spatial domain and SVD. Int. J. Intell. Syst. 37(8), 4747–4771 (2022)

    Article  Google Scholar 

  4. Singh, R., Izhar, L.I., Elamvazuthi, I., Ashok, A., Aole, S., Sharma, N.: Efficient watermarking method based on maximum entropy blocks selection in frequency domain for color images. IEEE Access 10, 52712–52723 (2022)

    Article  Google Scholar 

  5. Jana, M., Jana, B., Joardar, S.: Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing ambtc with fuzzy logic. J. King Saud Univ.-Comput. Inf. Sci. 34(10), 9822–9835 (2022)

    Google Scholar 

  6. Pal, P., Jana, B., Bhaumik, J.: An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code. Wireless Pers. Commun. 121(1), 939–961 (2021)

    Article  Google Scholar 

  7. Jana, M., Jana, B.: A new DCT based robust image watermarking scheme using cellular automata. Inf. Secur. J. Glob. Perspect. 31, 1–17 (2021)

    Google Scholar 

  8. Walton, S.: Image authentication for a slippery new age. Dr. Dobb’s J. 20(4), 18–26 (1995)

    Google Scholar 

  9. Wenyin, Z., Shih, F.Y.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011)

    Article  Google Scholar 

  10. Ojala, T., Pietikainen, M., Harwood, D.: Performance evaluation of texture measures with classification based on kullback discrimination of distributions. In: Proceedings of 12th International Conference on Pattern Recognition, vol. 1, pp. 582–585. IEEE (1994)

    Google Scholar 

  11. Ojala, T., Pietikäinen, M., Harwood, D.: A comparative study of texture measures with classification based on featured distributions. Pattern Recogn. 29(1), 51–59 (1996)

    Article  Google Scholar 

  12. He, D.-C., Wang, L.: Texture unit, texture spectrum, and texture analysis. IEEE Trans. Geosci. Remote Sens. 28(4), 509–512 (1990)

    Article  Google Scholar 

  13. Gull, S., Loan, N.A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: An efficient watermarking technique for tamper detection and localization of medical images. J. Ambient Intell. Humaniz. Comput. 11(5), 1799–1808 (2020)

    Article  Google Scholar 

  14. Bhalerao, S., Ansari, I.A., Kumar, A.: A secure image watermarking for tamper detection and localization. J. Ambient Intell. Humaniz. Comput. 12, 1057–1068 (2021)

    Article  Google Scholar 

  15. Trivedy, S., Pal, A.K.: A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran. J. Sci. Technol. Trans. Electr. Eng. 41(2), 103–113 (2017)

    Article  Google Scholar 

  16. Bal, S.N., Nayak, M.R., Sarkar, S.K.: On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J. King Saud Univ.-Comput. Inf. Sci. 33(5), 552–561 (2021)

    Google Scholar 

  17. Sahu, A.K.: A logistic map based blind and fragile watermarking for tamper detection and localization in images. J. Ambient Intell. Humaniz. Comput. 13, 1–13 (2021)

    Google Scholar 

  18. Singh, D., Singh, S.K.: DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl. 76(1), 953–977 (2017)

    Article  Google Scholar 

  19. Gul, E., Ozturk, S.: A novel triple recovery information embedding approach for self-embedded digital image watermarking. Multimedia Tools Appl. 79(41), 31239–31264 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Biswapati Jana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jana, M., Jana, B., Joardar, S. (2024). A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP). In: Dasgupta, K., Mukhopadhyay, S., Mandal, J.K., Dutta, P. (eds) Computational Intelligence in Communications and Business Analytics. CICBA 2023. Communications in Computer and Information Science, vol 1956. Springer, Cham. https://doi.org/10.1007/978-3-031-48879-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-48879-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-48878-8

  • Online ISBN: 978-3-031-48879-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics