Skip to main content
Log in

Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence Different Attacks with FEC Utilizing Consideration

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to the widely spreading of fake news utilizing image manipulation and its bad effects, this paper investigates efficient image contents verification and manipulation detection algorithm performance in presence different attacks and noisy wireless channel. The presented algorithm works based on making horizontal scanning of the image blocks after segmenting it to upper and lower partition, every one of them is divided to equal number of small blocks. These blocks marks the opposite block in another image petitions utilizing different transforms, DFT, DCT, WHT, and DWT transforms. This approach is evaluated and tested in presence different attacks and over the wireless noisy channel for measuring the reliability and robustness of the presented algorithm. The WHT, DCT and DWT based algorithm performed good. The computer simulations reveled the DWT-based approach provides images with littlie quality improving. The algorithm performance over the AWGN channel is bad at the low SNR. For solve this problem the simple and less-complex error control schemes have been utilized to decrease the required SNR for achieving accepted quality of the received image. The merging algorithm is proposed also based on utilizing the mark encrypted image and encrypt marked images verifications approaches. Finally, the computer simulations proved the reliability and robustness of the DWT-based approach and its high detection sensitivity for any image manipulation in the different testing scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. El-Bendary, M. A. M., Abou-El-azm, A. E., El-Fishawy, N. A., Shawki, F., El-Tokhy, M. A. R., & Kazemian, H. B. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 4.

    Article  Google Scholar 

  2. Petrovic, R. (2005) Digital watermarks for audio integrity verification. Serbia and Montenegro, Nis, (pp. 28–30)

  3. Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., El-Samie, F. E. A., & Faragallah, O. S. (2016). Secure wireless image communication using LSB Steganography and Chaotic Baker Ciphering. Wireless Personal Communications, 91, 3.

    Article  Google Scholar 

  4. Parah, S. A., Sheikh, J. A., Ahad, F., Loan, N. A., & Bhat, G. M. (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications, 76(8), 10599–10633.

    Article  Google Scholar 

  5. Noura, H., Noura, M., Salman, O., Couturier, R., & Chehab, A. (2020). Efficient & secure image availability and content protection. Multimedia Tools and Applications, 79, 22869–22904.

    Article  Google Scholar 

  6. Bhalerao, S., Ansari, I. A., & Kumar, A. (2020). A secure image watermarking for tamper detection and localization. Journal of Ambient Intelligence and Humanized Computing, 144, 5.

    Google Scholar 

  7. Pourhadi, A., & Mahdavi-Nasab, H. (2020). A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimedia Tools and Applications, 79, 21653–21677.

    Article  Google Scholar 

  8. Alshanbari, H. S. (2020). Medical image watermarking for ownership & tamper detection". Multimedia Tools and Applications, 169, 6.

    Google Scholar 

  9. Ariatmanto, D., & Ernawan, F. (2020). An improved robust image watermarking by using different embedding strengths. Multimedia Tools and Applications, 79, 12041–12067.

    Article  Google Scholar 

  10. Yang, L., Song, Q., & Wu, Y. (2020). Attacks on state-of-the-art face recognition using attentional adversarial attack generative network. Multimedia Tools and Applications, 80, 855–875.

    Article  Google Scholar 

  11. Kazemi, M. F., Pourmina, M. A., & Mazinan, A. H. (2020). Analysis of watermarking framework for color image through a neural network-based approach. Complex & Intelligent Systems, 6, 213–220.

    Article  Google Scholar 

  12. Kasban, H., & Nassar, S. (2020). An efficient approach for forgery detection in digital images using Hilbert-Huang transform. Applied Soft Computing, 97, PartA, 106728. https://doi.org/10.1016/j.asoc.2020.106728.

    Article  Google Scholar 

  13. Liu, J., & An, F.-P. (2020). Image classification algorithm based on deep learning-kernel function. Scientific Programming Journal. https://doi.org/10.1155/2020/7607612.

    Article  Google Scholar 

  14. Georgiou, T., Liu, Y., Chen, W., & Lew, M. (2020). A survey of traditional and deep learning-based feature descriptors for high dimensional data in computer vision. International Journal of Multimedia Information Retrieval, 9, 135–170.

    Article  Google Scholar 

  15. Goebel, M., Flenner, A., Nataraj, L., & Manjunath, B. S. (2019). Deep learning methods for event verification and image repurposing detection. Electronic Imaging, 2019(5), 530-1-530–7. https://doi.org/10.2352/ISSN.2470-1173.2019.5.MWSF-530.

    Article  Google Scholar 

  16. Kaur, R., Singh, S., & Kumar, H. (2020). TB-CoAuth: text based continuous authentication for detecting compromised accounts in social networks. Applied Soft Computing, 97, PartA, 106770.

    Article  Google Scholar 

  17. Chang, W. H., & Chang, L. W. (2010). Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments. Communications and Information Technologies (ISCIT), 5, 10.

    Google Scholar 

  18. Radharani, S., & Valarmathi, M. L. (2010). A study of watermarking scheme for image authentication. International Journal of Computer Applications, 2(4), 24–32.

    Article  Google Scholar 

  19. Lou, D. C., Liu, J. L., & Li, C. T. (2003). Digital signature-based image authentication. In C. S. Lu (Ed.), Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. Calgary: Idea Group Inc.

    Google Scholar 

  20. Barni, M., Bartolini, F., Cappellini, V., & Piva, A. (1998). A DCT-domain system for robust image watermarking. Signal Processing, 66, 357–372.

    Article  Google Scholar 

  21. Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.

    Article  Google Scholar 

  22. Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless Personal Communications, 79(3), 2141–2154.

    Article  Google Scholar 

  23. Wong, P. W. (1998). A watermark for image integrity and ownership verification. In Proceedings of IS & T PIC Conference, Portland, USA.

  24. Wu, M., & Liu, B. (1998). Watermarking for image authentication. In Proceedings of IEEE international conference on image processing, Chicago, USA (Vol. II, pp. 437–441).

  25. Wong, P. W. (1998) A public key watermark for image verification and authentication. In Proceedings of IEEE international conference on image processing, Chicago, USA (Vol. I, pp. 455–459).

  26. Fridrich, J., Goljan, M., & Baldoza, A. C. (2000). New fragile authentication watermark for images. In Proceedings of IEEE international conference on image processing, Vancouver, Canada (Vol. I, pp. 446–449).

  27. Li, C.-T., Lou, D.-C., & Liu, J.-L. (2000). Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In International conference on image processing, (Vol. 3, pp. 694–697).

  28. Anthony, T., Ho, S., & Yong, L. G. (2004). Image content authentication using pinned sine transform. EURASIP Journal of Appl. Signal Process, 14, 2174–2184.

    Google Scholar 

  29. Lu, C. S. (2004) On the security of structural information extraction/embedding for image authentication. In Proceedings of IEEE ISCAS’04 (pp. 169–172).

  30. Sun, Q., He, D., & Ye, S. (2003) Feature selection for semi fragile signature based authentication systems. In Proceedings of IEEE workshop on image signal processing (pp. 99–103).

  31. Lin, C.-Y., & Chang, S.-F. (2001). A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2), 153–168.

    Article  Google Scholar 

  32. Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., Abd El-Samie, F. E., & Faragallah, O. S. (2015). Efficient audio integrity verification algorithm using discrete cosine transform. International Journal of Speech Technology, 1, 9.

    Google Scholar 

  33. Nassar, S. S., Ayad, N. M., Kelash, H. M., El-sayed, H. S., El-Bendary, M. A. M., Abd El-Samie, F. E., & Faragallah, O. S. (2015). Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Communications, 86(1), 10.

    Google Scholar 

  34. Shoemaker, C., & Rudko (2002). Hidden bits: a survey of techniques for digital watermarking. Independent StudyEER-290 Prof Rudko.

  35. Tewfik, A. H. (2000). Digital watermarking. San Mercury News, 14 August, 2000.

  36. Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE Transactions on Computers C, 23(1), 90–93. https://doi.org/10.1109/T-C.1974.223784.

    Article  MathSciNet  MATH  Google Scholar 

  37. ShivaKumar, K. B., Raja, K. B., Chhotaray, R. K., & Pattnaik, S. (2010). Coherent steganography using segmentation and DCT. In IEEE.

  38. Khayam, S. A. (2003). The discrete cosine transform (DCT): Theory and application. East Lansing: Michigan State University.

    Google Scholar 

  39. Sultana, F., Charles, S., & Govardhan, A. (2013). A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. IJCSNS International Journal of Computer Science and Network Security, 13(5), 10.

    Google Scholar 

  40. El-Bendary, M. A. M., & Abou El-Azm, A. E. (2019). Complexity considerations: efficient image transmission over mobile communications channels. Multimedia Tools and Applications, 78(12), 16633–16664.

    Article  Google Scholar 

  41. Yadav, N. (2018). DWT-SVD-WHT watermarking using varying strength factor derived from means of the WHT coefficients. Arab J Sci Eng, 43, 4131–4143.

    Article  Google Scholar 

  42. Geethavani, B., & Prasad, E. V. (2014). High secure image steganography based on hopfield chaotic neural network and wavelet transforms. IJCSNS International Journal of Computer Science and Network Security, 14(3), 5.

    Google Scholar 

  43. El-Bendary, M. A. M., Haggag, A., Shawki, F., Abd-El-Samie, F. E. (2012) Proposed approach for improving Bluetooth networks security through SVD audio watermarking. In 2012 6th international conference on sciences of electronics, technologies.

  44. Nassar, S. S., Ayad, N. M., Kelash, H. M., El-Sayed, H. S., & El-Bendary, M. A. M. (2016). Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Communications, 88(3), 479–491.

    Article  Google Scholar 

  45. Kasban, H., & El-Bendary, M. A. M. M. K. (2016). Performance improvement of digital image transmission over mobile WiMAX networks. Wireless Personal Communications, 62, 1–17.

    Google Scholar 

  46. Sheikh, H., & Bovik, A. (2006). Image information and visual quality. IEEE Transactions on Image Processing, 15(2), 430–444. https://doi.org/10.1109/tip.2005.859378.

    Article  Google Scholar 

  47. Anu, S., Nair, H., & Aruna, P. (2015). Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems. Alexandria Engineering Journal, 54, 1161–1174.

    Article  Google Scholar 

  48. El-Bendary, M. A. M. (2017). FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of of noise and different attacks. Multimedia Tools and Applications, 76(24), 26463–26501.

    Article  Google Scholar 

  49. El-Bendary, M. A. M. M., Abou El-Azm, A. E., El-Fishawy, N. A., & Al-Hosarey, F. S. M. (2012). JPEG image transmission over mobile network with an efficient channel coding and interleaving. International Journal of Electronics, 99(11), 1497–1518.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen A. M. El-Bendary.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nassar, S.S., Faragallah, O.S. & El-Bendary, M.A.M. Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence Different Attacks with FEC Utilizing Consideration. Wireless Pers Commun 119, 37–61 (2021). https://doi.org/10.1007/s11277-021-08176-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08176-x

Keywords

Navigation