Skip to main content

Advertisement

Dual image-based reversible fragile watermarking scheme for tamper detection and localization

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Begum M, Uddin MS (2020) Digital image watermarking schemes: a review. Information 11(2):110

    Article  Google Scholar 

  2. Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimedia Tools Appl 78(7):8603–8633

    Article  Google Scholar 

  3. Korus P (2017) Digital image integrity—a survey of protection and verification schemes. Digital Signal Process 71:1–26

    Article  MathSciNet  Google Scholar 

  4. Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193–1218

    Article  Google Scholar 

  5. Mohanarathinam A, Kamalraj S, Venkatesan GP, Ravi RV, Manikandababu CS (2020) Digital watermarking schemes for image security: a review. J Ambient Intell Humaniz Comput 11:3221–3229

    Article  Google Scholar 

  6. Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking schemes and its application in e-governance. Multimedia Tools Appl 77(3):3597–3622

    Article  Google Scholar 

  7. Walton S (1995) Information authentication for a slippery new age. Dr Dobb’s J 20(4):18–26

    Google Scholar 

  8. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446

    Article  Google Scholar 

  9. Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41(11):3493–3496

    Article  MATH  Google Scholar 

  10. Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300–1307

    Article  Google Scholar 

  11. Wong PW (1998) A watermark for image integrity and ownership verification. In: PICS, pp 374–379

  12. Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings 1998 international conference on image processing-ICIP98 (Cat. No. 98CB36269), vol 1, IEEE, pp 455–459

  13. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  14. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  15. Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimedia Tools Appl 79(3):1673–1705

    Article  Google Scholar 

  16. Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimedia Tools Appl 72(1):41–56

    Article  Google Scholar 

  17. Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  18. Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimedia Tools Appl 76(15):16107–16123

    Article  Google Scholar 

  19. Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimedia Tools Appl 75(14):8695–8718

    Article  Google Scholar 

  20. Zhou W, Yu L, Wang Z, Wu M, Luo T, Sun L (2016) Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images. AEU Int J Electron Commun 70(1):77–84

    Article  Google Scholar 

  21. Sinha S, Singh A, Gupta R, Singh S (2018) Authentication and tamper detection in tele-medicine using zero watermarking. Procedia Comput Sci 132:557–562

    Article  Google Scholar 

  22. Belferdi W, Behloul A, Noui L (2019) A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimens Syst Signal Process 30(3):1093–1112

    Article  MathSciNet  MATH  Google Scholar 

  23. Pal P, Jana B, Bhaumik J (2019) Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur Privacy 2(2):e59

    Article  Google Scholar 

  24. Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2018.0

    Article  Google Scholar 

  25. Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electr Eng 41(2):103–113

    Article  Google Scholar 

  26. Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking scheme for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11(5):1799–1808

    Article  Google Scholar 

  27. Li Y, Wang H, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171–193

    Article  Google Scholar 

  28. Ahmadi M, Norouzi A, Karimi N, Samavi S, Emami A (2020) ReDMark: framework for residual diffusion watermarking based on deep networks. Expert Syst Appl 146:113157

    Article  Google Scholar 

  29. Uchida Y, Nagai Y, Sakazawa S, Satoh SI (2017) Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on international conference on multimedia retrieval, pp 269–277. https://doi.org/10.1145/3078971.3078974

  30. Deeba F, Kun S, Dharejo FA, Langah H, Memon H (2020) Digital watermarking using deep neural network. Int J Mach Learn Comput 10(2):277–282

    Article  Google Scholar 

  31. Lee JE, Seo YH, Kim DW (2020) Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark. Appl Sci 10(19):6854

    Article  Google Scholar 

  32. Chen YP, Fan TY, Chao HC (2021) WMNet: a lossless watermarking technique using deep learning for medical image authentication. Electronics 10(8):932

    Article  Google Scholar 

  33. Wang J, Wu H, Zhang X, Yao Y (2020) Watermarking in deep neural networks via error back-propagation. Electron Imaging 2020(4):22–31

    Google Scholar 

  34. Kandi H, Mishra D, Gorthi SRS (2017) Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput Secur 65:247–268

    Article  Google Scholar 

  35. Nagai Y, Uchida Y, Sakazawa S, Satoh SI (2018) Digital watermarking for deep neural networks. Int J Multimedia Inf Retr 7(1):3–16

    Article  Google Scholar 

  36. Zhong X, Huang PC, Mastorakis S, Shih FY (2020) An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans Multimedia 23:1951–1961

    Article  Google Scholar 

  37. Sahu AK (2021) A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-021-03365-9

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aditya Kumar Sahu.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahu, A.K., Sahu, M., Patro, P. et al. Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Applic 26, 571–590 (2023). https://doi.org/10.1007/s10044-022-01104-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-022-01104-0

Keywords