Skip to main content

Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking

  • Chapter
  • First Online:

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 70))

Abstract

Due to the increasing number of forged images and possibilities of effortless digital manipulations, certain organizations have started to focus on approaches that help preserve their digital data integrity. Image authentication systems try to accurately verify the integrity of digital images, of which digital watermarking is known to be one of the most precise techniques in authenticating the originality of digital images. This chapter has presented a novel image authentication system with accurate tamper localization ability. In the proposed algorithm a 16-bit watermark key has been created from each block of pixels in a host image. The generated 16-bit watermark key will be embedded into the host image by utilizing a fragile watermarking algorithm. The security of the watermarking algorithm will be ensured by using the proposed block cipher algorithm, which encrypts the user key and watermarking algorithm. The proposed tamper detection algorithm conducts two comprehensive comparisons, to ensure the accuracy of the results. The high quality watermarks and powerful tamper detection approaches, along with less computational complexity are the main advantages of the proposed image authentication system, which makes it suitable for real-time application. Several tampering experiments have been conducted to examine the proposed algorithm. The experiment results have clearly proved that, the proposed method is not only efficient, but also very accurate in detecting different types of digital image manipulations, such as, small region tampering, cropping tampering and bit tampering.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Vrusias, B., et al.: Forensic Photography. University of Surrey, Computing Department (2001). Technical Report

    Google Scholar 

  2. Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)

    Article  Google Scholar 

  3. Ho, A.T.: Semi-fragile watermarking and authentication for law enforcement applications. In: Innovative Computing, Information and Control, p. 286 (2007)

    Google Scholar 

  4. Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE image processing, (1997)

    Google Scholar 

  5. Cox, I., et al.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, USA (2007)

    Google Scholar 

  6. Lin, W., et al.: Multimedia Analysis, Processing and Communications, vol. 346, p. 139183 (2011)

    Google Scholar 

  7. Chang, C.-C., Hu, Y.-S., Lu, T.-C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)

    Article  Google Scholar 

  8. Lin, T.-C., Lin, C.-M.: Wavelet-based copyright-protection scheme for digital images based on local features. Inf. Sci. 179(19), 3349–3358 (2009)

    Article  Google Scholar 

  9. Guo, H., Georganas, N.D.: Jointly verifying ownership of an image using digital watermarking. Multimedia Tools Appl. 27(3), 323–349 (2005)

    Article  Google Scholar 

  10. Zhu, X., Ho, A.T., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process.: Image Commun. 22(5), 515–528 (2007)

    Google Scholar 

  11. Tsolis, D., et al.: Applying robust multibit watermarks to digital images. J. Comput. Appl. Math. 227(1), 213–220 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  12. Huang, C.-H., Wu, J.-L.: Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes. Inf. Sci. 179(6), 791–808 (2009)

    Article  Google Scholar 

  13. Wang, S.-S., Tsai, S.-L.: Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn. 41(2), 701–712 (2008)

    Article  MATH  Google Scholar 

  14. Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  15. Yu, G.-J., Lu, C.-S., Liao, H.-Y.M.: Mean-quantization-based fragile watermarking for image authentication. Opt. Eng. 40(7), 1396–1408 (2001)

    Article  Google Scholar 

  16. Li, C.-T., Si, H.: Wavelet-based fragile watermarking scheme for image authentication. J. Electron. Imaging 16(1), 013009–013009-9 (2007)

    Google Scholar 

  17. Yen, E., Tsai, K.-S.: HDWT-based grayscale watermark for copyright protection. Expert Syst. Appl. 35(1), 301–306 (2008)

    Article  Google Scholar 

  18. Lin, C.-Y., Chang, S.-F.: Semifragile watermarking for authenticating JPEG visual content. In: Electronic Imaging. International Society for Optics and Photonics, (2000)

    Google Scholar 

  19. Lin, H.-Y.S., et al.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)

    Article  Google Scholar 

  20. Zhang, X., et al.: Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12), 3026–3036 (2010)

    Article  MATH  Google Scholar 

  21. Wong, P.W.: A public key watermark for image verification and authentication. In: Image Processing, ICIP 98. pp. 455–459, (1998)

    Google Scholar 

  22. Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proceeding of SPIE Security and Watermarking of Multimedia Contents, pp. 691–700 (2002)

    Google Scholar 

  23. Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–730 (2007)

    Article  Google Scholar 

  24. Ohkita, K., et al.: Improving capability of locating tampered pixels of statistical fragile watermarking, In: Digital Watermarking, pp. 279–293. Springer, (2009)

    Google Scholar 

  25. Lin, S.D., Kuo, Y.-C., Huang, Y.-H.: An image watermarking scheme with tamper detection and recovery. In: IEEE Innovative Computing, Information and Control, (2006)

    Google Scholar 

  26. Chang, C.-C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 41(2), 654–661 (2008)

    Article  MATH  Google Scholar 

  27. Zhang, X., Wang, S.: Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4), 675–679 (2009)

    Article  MATH  Google Scholar 

  28. Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)

    Article  MATH  Google Scholar 

  29. Chaluvadi, S.B., Prasad, M.V.: Efficient image tamper detection and recovery technique using dual watermark. In: Nature & Biologically Inspired Computing, (2009)

    Google Scholar 

  30. Lin, E.T., Podilchuk, C.I., Delp, E.J.: III Detection of image alterations using semifragile watermarks. In: Electronic Imaging, (2000)

    Google Scholar 

  31. Ho, A.T., Zhu, X., Woon, W.: A semi-fragile pinned sine transform watermarking system for content authentication of satellite images. In: IEEE Geoscience and Remote Sensing Symposium, (2005)

    Google Scholar 

  32. Zhao, X., Bateman, P., Ho, A.T.: Image Authentication Using Active Watermarking and Passive Forensics Techniques, in Multimedia Analysis, Processing and Communications, pp. 139–183. Springer, (2011)

    Google Scholar 

  33. Rosales-Roldan, L., et al.: Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process. Image Commun. 28(1), 69–83 (2013)

    Article  Google Scholar 

  34. Tong, X., et al.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28(3), 301–308 (2013)

    Article  Google Scholar 

  35. Dadkhah, S., Manaf, A.A., Sadeghi, S.: Efficient digital image authentication and tamper localization technique using 3Lsb watermarking. Int. J. Comput. Sci. Issues (IJCSI), 9(1), (2012)

    Google Scholar 

  36. Hsu, C.-S., Tu, S.-F.: Image tamper detection and recovery using differential embedding strategy. In: IEEE Communications, Computers and Signal Processing (PacRim), (2011)

    Google Scholar 

  37. Yeo, D.-G., Lee, H.-Y.: Block-based image authentication algorithm using reversible watermarking, In: Computer Science and Convergence, pp. 703–711. Springer (2012)

    Google Scholar 

  38. Weber, A.G.: The USC-SIPI image database version 5. USC-SIPI Rep. 315, 1–24 (1997)

    Google Scholar 

  39. Pullen, M. Crime Scene. High Fashion Crime Scenes, (2010) http://www.melaniepullen.com/

  40. Christlein, V., et al.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)

    Article  Google Scholar 

  41. Perona, M.F.A.P.: Computational vision at Caltech. [Image database], (2010) http://www.vision.caltech.edu/archive.html

Download references

Acknowledgments

The authors would like to thank Universiti Teknologi Malaysia for their educational and financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajjad Dadkhah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Dadkhah, S., Manaf, A.A., Sadeghi, S. (2014). Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43616-5_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43615-8

  • Online ISBN: 978-3-662-43616-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics