Abstract
Due to the increasing number of forged images and possibilities of effortless digital manipulations, certain organizations have started to focus on approaches that help preserve their digital data integrity. Image authentication systems try to accurately verify the integrity of digital images, of which digital watermarking is known to be one of the most precise techniques in authenticating the originality of digital images. This chapter has presented a novel image authentication system with accurate tamper localization ability. In the proposed algorithm a 16-bit watermark key has been created from each block of pixels in a host image. The generated 16-bit watermark key will be embedded into the host image by utilizing a fragile watermarking algorithm. The security of the watermarking algorithm will be ensured by using the proposed block cipher algorithm, which encrypts the user key and watermarking algorithm. The proposed tamper detection algorithm conducts two comprehensive comparisons, to ensure the accuracy of the results. The high quality watermarks and powerful tamper detection approaches, along with less computational complexity are the main advantages of the proposed image authentication system, which makes it suitable for real-time application. Several tampering experiments have been conducted to examine the proposed algorithm. The experiment results have clearly proved that, the proposed method is not only efficient, but also very accurate in detecting different types of digital image manipulations, such as, small region tampering, cropping tampering and bit tampering.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Vrusias, B., et al.: Forensic Photography. University of Surrey, Computing Department (2001). Technical Report
Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)
Ho, A.T.: Semi-fragile watermarking and authentication for law enforcement applications. In: Innovative Computing, Information and Control, p. 286 (2007)
Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE image processing, (1997)
Cox, I., et al.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, USA (2007)
Lin, W., et al.: Multimedia Analysis, Processing and Communications, vol. 346, p. 139183 (2011)
Chang, C.-C., Hu, Y.-S., Lu, T.-C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)
Lin, T.-C., Lin, C.-M.: Wavelet-based copyright-protection scheme for digital images based on local features. Inf. Sci. 179(19), 3349–3358 (2009)
Guo, H., Georganas, N.D.: Jointly verifying ownership of an image using digital watermarking. Multimedia Tools Appl. 27(3), 323–349 (2005)
Zhu, X., Ho, A.T., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process.: Image Commun. 22(5), 515–528 (2007)
Tsolis, D., et al.: Applying robust multibit watermarks to digital images. J. Comput. Appl. Math. 227(1), 213–220 (2009)
Huang, C.-H., Wu, J.-L.: Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes. Inf. Sci. 179(6), 791–808 (2009)
Wang, S.-S., Tsai, S.-L.: Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn. 41(2), 701–712 (2008)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)
Yu, G.-J., Lu, C.-S., Liao, H.-Y.M.: Mean-quantization-based fragile watermarking for image authentication. Opt. Eng. 40(7), 1396–1408 (2001)
Li, C.-T., Si, H.: Wavelet-based fragile watermarking scheme for image authentication. J. Electron. Imaging 16(1), 013009–013009-9 (2007)
Yen, E., Tsai, K.-S.: HDWT-based grayscale watermark for copyright protection. Expert Syst. Appl. 35(1), 301–306 (2008)
Lin, C.-Y., Chang, S.-F.: Semifragile watermarking for authenticating JPEG visual content. In: Electronic Imaging. International Society for Optics and Photonics, (2000)
Lin, H.-Y.S., et al.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)
Zhang, X., et al.: Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12), 3026–3036 (2010)
Wong, P.W.: A public key watermark for image verification and authentication. In: Image Processing, ICIP 98. pp. 455–459, (1998)
Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proceeding of SPIE Security and Watermarking of Multimedia Contents, pp. 691–700 (2002)
Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–730 (2007)
Ohkita, K., et al.: Improving capability of locating tampered pixels of statistical fragile watermarking, In: Digital Watermarking, pp. 279–293. Springer, (2009)
Lin, S.D., Kuo, Y.-C., Huang, Y.-H.: An image watermarking scheme with tamper detection and recovery. In: IEEE Innovative Computing, Information and Control, (2006)
Chang, C.-C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 41(2), 654–661 (2008)
Zhang, X., Wang, S.: Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4), 675–679 (2009)
Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)
Chaluvadi, S.B., Prasad, M.V.: Efficient image tamper detection and recovery technique using dual watermark. In: Nature & Biologically Inspired Computing, (2009)
Lin, E.T., Podilchuk, C.I., Delp, E.J.: III Detection of image alterations using semifragile watermarks. In: Electronic Imaging, (2000)
Ho, A.T., Zhu, X., Woon, W.: A semi-fragile pinned sine transform watermarking system for content authentication of satellite images. In: IEEE Geoscience and Remote Sensing Symposium, (2005)
Zhao, X., Bateman, P., Ho, A.T.: Image Authentication Using Active Watermarking and Passive Forensics Techniques, in Multimedia Analysis, Processing and Communications, pp. 139–183. Springer, (2011)
Rosales-Roldan, L., et al.: Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process. Image Commun. 28(1), 69–83 (2013)
Tong, X., et al.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28(3), 301–308 (2013)
Dadkhah, S., Manaf, A.A., Sadeghi, S.: Efficient digital image authentication and tamper localization technique using 3Lsb watermarking. Int. J. Comput. Sci. Issues (IJCSI), 9(1), (2012)
Hsu, C.-S., Tu, S.-F.: Image tamper detection and recovery using differential embedding strategy. In: IEEE Communications, Computers and Signal Processing (PacRim), (2011)
Yeo, D.-G., Lee, H.-Y.: Block-based image authentication algorithm using reversible watermarking, In: Computer Science and Convergence, pp. 703–711. Springer (2012)
Weber, A.G.: The USC-SIPI image database version 5. USC-SIPI Rep. 315, 1–24 (1997)
Pullen, M. Crime Scene. High Fashion Crime Scenes, (2010) http://www.melaniepullen.com/
Christlein, V., et al.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)
Perona, M.F.A.P.: Computational vision at Caltech. [Image database], (2010) http://www.vision.caltech.edu/archive.html
Acknowledgments
The authors would like to thank Universiti Teknologi Malaysia for their educational and financial support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Dadkhah, S., Manaf, A.A., Sadeghi, S. (2014). Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-662-43616-5_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43615-8
Online ISBN: 978-3-662-43616-5
eBook Packages: EngineeringEngineering (R0)