Skip to main content
Log in

Self-embedding framework for tamper detection and restoration of color images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The present era is paving huge expansion to the transmission of digital data in fields like health, military intelligence, scientific research, and publication media, etc. The nature of digital data makes it more vulnerable to various intentional and unintentional attacks and hence increases the necessity of verifying its integrity and authenticity. In this paper, a novel image watermarking method for tamper detection and recovery of color images has been proposed. The color image is primarily separated into three planes, and then each plane is divided into four equal halves. We sub-divide each half into 4 × 4 non-overlapping blocks. Further, from a group of four corresponding sub-blocks, a 32-bit watermark comprising of the arithmetic mean value along with the 8-bit data containing the location of the mapped block is generated. This 32-bit generated watermark is embedded into the two least significant bits (LSB) of the mapped block after being encrypted using gray code. The information is embedded in such a way using chaotic sequence such that a full restoration process can be carried out, even if 75% of blocks in any of the three planes get tampered with. This method obtains a high-quality restored image with an average PSNR value of 39.22 dB for the RGB model and 39.37 dB for the YCbCr model. The performance of the proposed method for various collage attacks shows its efficacy over other state-of-art techniques, making it a suitable candidate for the recovery of tampered color images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Alsmirat AM, Alem FA, Ayyoub MA, Jararweh Y, Gupta BB (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78:3649–3688. https://doi.org/10.1007/s11042-017-5537-5

    Article  Google Scholar 

  2. Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80. https://doi.org/10.1016/j.comcom.2020.01.038

    Article  Google Scholar 

  3. Ansari IA, Pant M, Ahn CW (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  4. Azeroual A, Karim A (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU-Int J Electron Commun 79:207–218

    Article  Google Scholar 

  5. Bhalerao S, Ansari IA, Kumar AA (2020) Secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12:1057–1068. https://doi.org/10.1007/s12652-020-02135-3

    Article  Google Scholar 

  6. Rogelio RR, Cruz-Ramos C, Ponomarvoy V, Garcia-Salgado BP et al., (2021) Color image self recovery and tampering detection scheme based on fragile watermarking with high recovery capability. Applies Sciences, 11(7): 3189

  7. Bravo SS, Calderon F, Li TC, Nandi AK (2020) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing 73:83–92

    Article  MathSciNet  Google Scholar 

  8. Cao F et al (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60

    Article  Google Scholar 

  9. Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36(3):578–584

    Article  Google Scholar 

  10. Dadkhah S, Manaf AA, Sadeghi S (2014) An efficient image self-recovery and tamper detection using fragile watermarking. International Conference Image Analysis and Recognition. Springer, Cham, 504–513

  11. Dadkhah S, Abd Manaf A, Hori Y, Ella Hassanien A, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210

    Article  Google Scholar 

  12. Fan MQ, Wang HX (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process Image Commun 66:19–29

    Article  Google Scholar 

  13. Feng B, Li X, Jie Y, Guo C, Fu H (2020) A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mobile Netw Appl 25:82–94. https://doi.org/10.1007/s11036-018-1186-9

    Article  Google Scholar 

  14. Gull S, Parah SA, Khan M (2020) Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare. Comput Commun 163:134–149

    Article  Google Scholar 

  15. Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11(5):1799–1808

    Article  Google Scholar 

  16. Gull S, Mansour RF, Aljehane NO, Parah SA (2021) A self-embedding technique for tamper detection and localization of medical images for smart-health. Multimed Tools Appl 80(19):29939–29964

    Article  Google Scholar 

  17. Hassan FS, Gutub AA (2021) Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans Intell Technol 7:5668. https://doi.org/10.1049/cit2.12053

    Article  Google Scholar 

  18. He H, Chen F, Tai HM, Kalker T, Zhang J (2011) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7(1):185–196

    Article  Google Scholar 

  19. Huang SC, Jiang CF (2012) A color image authentication and recovery method using block truncation code embedding. J Mar Sci Technol 20(1):49–55

    Article  MathSciNet  Google Scholar 

  20. Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2018) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654–673. https://doi.org/10.1016/j.future02018.12.036

    Article  Google Scholar 

  21. Hurrah NN, Parah SA, Sheikh JA (2020) Embedding in medical images: an efficient scheme for authentication and tamper localization. Multimed Tools Appl 79:21441–21470. https://doi.org/10.1007/s11042-020-08988-2

    Article  Google Scholar 

  22. Hussan M et al (2021) Tamper detection and self-recovery of medical imagery for smart health. Arab J Sci Eng:1–17. https://doi.org/10.1007/s13369-020-05135-9AJSE-D-20-03588R1

  23. Kabir MA (2021) An efficient low bit rate image watermarking and tamper detection for image authentication. SN Appl Sci 3:400. https://doi.org/10.1007/s42452-021-04387-w

    Article  Google Scholar 

  24. Kiatpapan S, Kondo T (2015) An image tamper detection and recovery method based on self-embedding dual watermarking. 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). IEEE, 1–6

  25. Kishore RR (2020) A novel and efficient blind domain image watermarking in transform domain. Procedia Comput Sci 167:1505–1514

    Article  Google Scholar 

  26. Kodak image dataset is available on http://r0k.us/graphics/kodak. Accessed 7 June 2021

  27. Korus P, Dziech A (2012) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  Google Scholar 

  28. Korus P, Dziech A (2013) Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans Inf Forensics Secur 9(2):169–181

    Article  Google Scholar 

  29. Kumar A, Ghrera SP, Tyagi V (2017) An ID-based secure and flexible buyer-seller watermarking protocol for copyright protection.

  30. UCID Image Dataset is available on http://homepages.lboro.ac.uk/cogs/datasets/ucid/data/ucid.v2.tar.gz. Accessed 24 Aug 2020

  31. Lee TY, Shinfeng DL (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  Google Scholar 

  32. Li Y, Song W, Zhao X, Wang J, Zhao L (2019) A novel image tamper detection and self-recovery algorithm based on watermarking and chaotic system. Mathematics 7:955. https://doi.org/10.3390/math7100955

    Article  Google Scholar 

  33. Lin ET, Christine IP, Edward JD (2000) Detection of image alterations using semifragile watermarks. Security and Watermarking of Multimedia Contents II (Vol. 3971, pp. 152-163). International Society for Optics and Photonics

  34. Lin PL, Chung KH, Po WH (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  35. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897

    Article  Google Scholar 

  36. Mehta R, Rajpal N, Virendra PV (2018) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern 9(1):145–161

    Article  Google Scholar 

  37. Molina GJ et al (2020) An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 81:115725

    Article  Google Scholar 

  38. Mustafa M, Mustafa G, Parah SA, Sheikh JA (2010) Field programmable gate array (FPGA) implementation of novel complex PN-code-generator-based data scrambler and descrambler. Maejo Int J Sci Technol 4:125–135

    Google Scholar 

  39. Parah SA, Bhat GM, Sheikh JA (2014) A secure and efficient data hiding technique based on pixel adjustment. Am J Eng Technol Res 14:38–44

    Google Scholar 

  40. Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. 2012 international symposium on intelligent signal processing and communications systems. IEEE, 430–435

  41. Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79:1673–1705. https://doi.org/10.1007/s11042-019-08144-5

    Article  Google Scholar 

  42. Qi X, Xin XA (2015) Singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Visual Commun 30:312–327

    Google Scholar 

  43. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286

    Article  Google Scholar 

  44. Rajput V, Ansari IA (2019) Image tamper detection and self-recovery using multiple median watermarking. Multimed Tools Appl 79(47):35519–35535. https://doi.org/10.1007/s11042-019-07971-w

    Article  Google Scholar 

  45. Saeed S, Mohammad AA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266–2277

    Article  MathSciNet  Google Scholar 

  46. Sahu AK (2021) A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-021-03365-9

  47. Sarreshtedari S, Akhaee MA (2015) A Source-Channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24:2266–2277

    Article  MathSciNet  Google Scholar 

  48. Shivendra S, Singh D, Agarwal S (2013) DCT based approach for tampered image detection and recovery using block wise fragile watermarking scheme. Iberian Conference on Pattern Recognition and Image Analysis. Springer, Berlin, Heidelberg, 640–647

  49. Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  50. Stergiou CL, Psannis KE, Gupta BB (1 April1, 2021) IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network. IEEE Internet Things J 8(7):5164–5171. https://doi.org/10.1109/JIOT.2020.3033131

    Article  Google Scholar 

  51. Tai WW, Zi JL (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11–25

    Article  Google Scholar 

  52. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  53. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585–4608. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

  54. Zhang X, Xiao Y, Zhao Z (2015) Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74(15):5767–5786

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Ethics declarations

• The authors have no relevant financial or non-financial interests to disclose.

• The authors have no competing interests to declare that are relevant to the content of this article.

• All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

• The authors have no financial or proprietary interests in any material discussed in this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussan, M., Parah, S.A., Jan, A. et al. Self-embedding framework for tamper detection and restoration of color images. Multimed Tools Appl 81, 18563–18594 (2022). https://doi.org/10.1007/s11042-022-12545-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12545-4

Keywords

Navigation