Abstract
Due to the widely spreading of fake news utilizing image manipulation and its bad effects, this paper investigates efficient image contents verification and manipulation detection algorithm performance in presence different attacks and noisy wireless channel. The presented algorithm works based on making horizontal scanning of the image blocks after segmenting it to upper and lower partition, every one of them is divided to equal number of small blocks. These blocks marks the opposite block in another image petitions utilizing different transforms, DFT, DCT, WHT, and DWT transforms. This approach is evaluated and tested in presence different attacks and over the wireless noisy channel for measuring the reliability and robustness of the presented algorithm. The WHT, DCT and DWT based algorithm performed good. The computer simulations reveled the DWT-based approach provides images with littlie quality improving. The algorithm performance over the AWGN channel is bad at the low SNR. For solve this problem the simple and less-complex error control schemes have been utilized to decrease the required SNR for achieving accepted quality of the received image. The merging algorithm is proposed also based on utilizing the mark encrypted image and encrypt marked images verifications approaches. Finally, the computer simulations proved the reliability and robustness of the DWT-based approach and its high detection sensitivity for any image manipulation in the different testing scenarios.
Similar content being viewed by others
References
El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 4.
Petrovic, R. (2005) Digital watermarks for audio integrity verification. Serbia and Montenegro, Nis, (pp. 28–30)
Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., El-Samie, F. E. A., & Faragallah, O. S. (2016). Secure wireless image communication using LSB Steganography and Chaotic Baker Ciphering. Wireless Personal Communications, 91, 3.
Parah, S. A., Sheikh, J. A., Ahad, F., Loan, N. A., & Bhat, G. M. (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications, 76(8), 10599–10633.
Noura, H., Noura, M., Salman, O., Couturier, R., & Chehab, A. (2020). Efficient & secure image availability and content protection. Multimedia Tools and Applications, 79, 22869–22904.
Bhalerao, S., Ansari, I. A., & Kumar, A. (2020). A secure image watermarking for tamper detection and localization. Journal of Ambient Intelligence and Humanized Computing, 144, 5.
Pourhadi, A., & Mahdavi-Nasab, H. (2020). A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimedia Tools and Applications, 79, 21653–21677.
Alshanbari, H. S. (2020). Medical image watermarking for ownership & tamper detection". Multimedia Tools and Applications, 169, 6.
Ariatmanto, D., & Ernawan, F. (2020). An improved robust image watermarking by using different embedding strengths. Multimedia Tools and Applications, 79, 12041–12067.
Yang, L., Song, Q., & Wu, Y. (2020). Attacks on state-of-the-art face recognition using attentional adversarial attack generative network. Multimedia Tools and Applications, 80, 855–875.
Kazemi, M. F., Pourmina, M. A., & Mazinan, A. H. (2020). Analysis of watermarking framework for color image through a neural network-based approach. Complex & Intelligent Systems, 6, 213–220.
Kasban, H., & Nassar, S. (2020). An efficient approach for forgery detection in digital images using Hilbert-Huang transform. Applied Soft Computing, 97, PartA, 106728. https://doi.org/10.1016/j.asoc.2020.106728.
Liu, J., & An, F.-P. (2020). Image classification algorithm based on deep learning-kernel function. Scientific Programming Journal. https://doi.org/10.1155/2020/7607612.
Georgiou, T., Liu, Y., Chen, W., & Lew, M. (2020). A survey of traditional and deep learning-based feature descriptors for high dimensional data in computer vision. International Journal of Multimedia Information Retrieval, 9, 135–170.
Goebel, M., Flenner, A., Nataraj, L., & Manjunath, B. S. (2019). Deep learning methods for event verification and image repurposing detection. Electronic Imaging, 2019(5), 530-1-530–7. https://doi.org/10.2352/ISSN.2470-1173.2019.5.MWSF-530.
Kaur, R., Singh, S., & Kumar, H. (2020). TB-CoAuth: text based continuous authentication for detecting compromised accounts in social networks. Applied Soft Computing, 97, PartA, 106770.
Chang, W. H., & Chang, L. W. (2010). Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments. Communications and Information Technologies (ISCIT), 5, 10.
Radharani, S., & Valarmathi, M. L. (2010). A study of watermarking scheme for image authentication. International Journal of Computer Applications, 2(4), 24–32.
Lou, D. C., Liu, J. L., & Li, C. T. (2003). Digital signature-based image authentication. In C. S. Lu (Ed.), Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. Calgary: Idea Group Inc.
Barni, M., Bartolini, F., Cappellini, V., & Piva, A. (1998). A DCT-domain system for robust image watermarking. Signal Processing, 66, 357–372.
Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.
Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless Personal Communications, 79(3), 2141–2154.
Wong, P. W. (1998). A watermark for image integrity and ownership verification. In Proceedings of IS & T PIC Conference, Portland, USA.
Wu, M., & Liu, B. (1998). Watermarking for image authentication. In Proceedings of IEEE international conference on image processing, Chicago, USA (Vol. II, pp. 437–441).
Wong, P. W. (1998) A public key watermark for image verification and authentication. In Proceedings of IEEE international conference on image processing, Chicago, USA (Vol. I, pp. 455–459).
Fridrich, J., Goljan, M., & Baldoza, A. C. (2000). New fragile authentication watermark for images. In Proceedings of IEEE international conference on image processing, Vancouver, Canada (Vol. I, pp. 446–449).
Li, C.-T., Lou, D.-C., & Liu, J.-L. (2000). Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In International conference on image processing, (Vol. 3, pp. 694–697).
Anthony, T., Ho, S., & Yong, L. G. (2004). Image content authentication using pinned sine transform. EURASIP Journal of Appl. Signal Process, 14, 2174–2184.
Lu, C. S. (2004) On the security of structural information extraction/embedding for image authentication. In Proceedings of IEEE ISCAS’04 (pp. 169–172).
Sun, Q., He, D., & Ye, S. (2003) Feature selection for semi fragile signature based authentication systems. In Proceedings of IEEE workshop on image signal processing (pp. 99–103).
Lin, C.-Y., & Chang, S.-F. (2001). A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2), 153–168.
Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., Abd El-Samie, F. E., & Faragallah, O. S. (2015). Efficient audio integrity verification algorithm using discrete cosine transform. International Journal of Speech Technology, 1, 9.
Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., Abd El-Samie, F. E., & Faragallah, O. S. (2015). Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Communications, 86(1), 10.
Shoemaker, C., & Rudko (2002). Hidden bits: a survey of techniques for digital watermarking. Independent StudyEER-290 Prof Rudko.
Tewfik, A. H. (2000). Digital watermarking. San Mercury News, 14 August, 2000.
Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE Transactions on Computers C, 23(1), 90–93. https://doi.org/10.1109/T-C.1974.223784.
ShivaKumar, K. B., Raja, K. B., Chhotaray, R. K., & Pattnaik, S. (2010). Coherent steganography using segmentation and DCT. In IEEE.
Khayam, S. A. (2003). The discrete cosine transform (DCT): Theory and application. East Lansing: Michigan State University.
Sultana, F., Charles, S., & Govardhan, A. (2013). A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. IJCSNS International Journal of Computer Science and Network Security, 13(5), 10.
El-Bendary, M. A. M., & Abou El-Azm, A. E. (2019). Complexity considerations: efficient image transmission over mobile communications channels. Multimedia Tools and Applications, 78(12), 16633–16664.
Yadav, N. (2018). DWT-SVD-WHT watermarking using varying strength factor derived from means of the WHT coefficients. Arab J Sci Eng, 43, 4131–4143.
Geethavani, B., & Prasad, E. V. (2014). High secure image steganography based on hopfield chaotic neural network and wavelet transforms. IJCSNS International Journal of Computer Science and Network Security, 14(3), 5.
El-Bendary, M. A. M., Haggag, A., Shawki, F., Abd-El-Samie, F. E. (2012) Proposed approach for improving Bluetooth networks security through SVD audio watermarking. In 2012 6th international conference on sciences of electronics, technologies.
Nassar, S. S., Ayad, N. M., Kelash, H. M., El-Sayed, H. S., & El-Bendary, M. A. M. (2016). Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Communications, 88(3), 479–491.
Kasban, H., & El-Bendary, M. A. M. M. K. (2016). Performance improvement of digital image transmission over mobile WiMAX networks. Wireless Personal Communications, 62, 1–17.
Sheikh, H., & Bovik, A. (2006). Image information and visual quality. IEEE Transactions on Image Processing, 15(2), 430–444. https://doi.org/10.1109/tip.2005.859378.
Anu, S., Nair, H., & Aruna, P. (2015). Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems. Alexandria Engineering Journal, 54, 1161–1174.
El-Bendary, M. A. M. (2017). FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of of noise and different attacks. Multimedia Tools and Applications, 76(24), 26463–26501.
El-Bendary, M. A. M. M., Abou El-Azm, A. E., El-Fishawy, N. A., & Al-Hosarey, F. S. M. (2012). JPEG image transmission over mobile network with an efficient channel coding and interleaving. International Journal of Electronics, 99(11), 1497–1518.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Nassar, S.S., Faragallah, O.S. & El-Bendary, M.A.M. Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence Different Attacks with FEC Utilizing Consideration. Wireless Pers Commun 119, 37–61 (2021). https://doi.org/10.1007/s11277-021-08176-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08176-x