Abstract
In real-time data transmission, the protection of multimedia content from unauthorized access is pivotal. In this context, digital watermarking techniques have drawn significant attention from the past few decades. However, most of the reported techniques fail to achieve a good balance among the perceptual transparency, embedding capacity (EC), and robustness. Besides, tamper detection and localization are the two crucial aspects of any authentication based watermarking technique. This paper proposes a logistic map based fragile watermarking technique to efficiently detect and localize the tampered regions from the watermarked image (WI). The proposed technique takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Next, these watermark bits are embedded in the rightmost least significant bits (LSBs) by performing the logical XOR operation between the first intermediate significant bits (ISBs) and the watermark bits. Simulation results show that the proposed technique can produce high quality WI with an average peak signal-to-noise ratio (PSNR) of 51.14 dB. Further, the proposed technique can efficiently detect and locate the tampering regions from the image with a high true positive rate, low false positive and negative rate. Additionally, the proposed technique exhibits an excellent ability to resist various intentional and unintentional attacks which makes it suitable for real-time applications.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
My manuscript has no associated data.
References
Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2018.04.006
Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110
Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recognit Lett 27(5):439–446
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Che S, Ma B, Che Z (2008) An adaptive and fragile image watermarking algorithm based on composite chaotic iterative dynamic system. In: IEEE 2008 international conference on intelligent information hiding and multimedia signal processing, pp 159–162
Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307
Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41–56
Cheng CJ, Hwang WJ, Zeng HY, Lin YC (2014) A fragile watermarking algorithm for hologram authentication. J Disp Technol 10(4):263–271
Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 78(13):17701–17718
Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Hum Comput 11(5):1799–1808
He H, Zhang J, Chen F (2007) Block-wise fragile watermarking scheme based on scramble encryption. In: IEEE 2007 second international conference on bio-inspired computing: theories and applications, pp 216–220
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441
Hong, I, Kim, I, & Han, SS (2001) A blind watermarking technique using wavelet transform. In: ISIE 2001. In: IEEE international symposium on industrial electronics proceedings (Cat. No. 01TH8570), 3, pp 1946–1950
Korus P (2017) Digital image integrity–a survey of protection and verification techniques. Digital Signal Process 71:1–26
Laouamer L, Al-Shaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innovation Digital Ecosyst 2(1–2):1–12
Mohanarathinam A, Kamalraj S, Venkatesan GP, Ravi RV, Manikandababu CS (2020) Digital watermarking techniques for image security: a review. J Ambient Intell Hum Comput. 11:3221–3229. https://doi.org/10.1007/s12652-019-01500-1
Mohsin AH, Zaidan AA, Zaidan BB, Bin-Ariffin SA, Albahri OS, Albahri AS, Alsalem M, Mohammed KI, Hashim M (2018) Real-time medical systems based on human biometric steganography: a systematic review. J Med Sys 42(12):1–20
Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI, Nidhal S, Jalood NS, Jasim AN, Shareef AH (2019a) New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7:168994–169010
Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI (2019b) Based medical systems for patient’s authentication: towards a new verification secure framework using CIA standard. J Med Sys 43(7):1–34
Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107–16123
Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE 2012 international symposium on intelligent signal processing and communications systems, pp 430–435
Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3):1673–1705
Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 65(10):840–847
Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Adv Signal Process 2002(6):1–9
Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193–1218
Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit Lett 25(16):1893–1903
Suthaharan S (2010) Logistic map-based fragile watermarking for pixel level tamper detection and resistance. EURASIP J Inf Secur 2010(1):829516
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308
Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electric Eng 41(2):103–113
Walton S (1995) Information authentication for a slippery new age. Dr Dobb’s J 20(4):18–26
Wong PW (1998a) A watermark for image integrity and ownership verification. In: PICS, pp 374–379
Wong PW (1998b) A public key watermark for image verification and authentication. In: Proceedings 1998 IEEE international conference on image processing. ICIP98 (Cat. No. 98CB36269), 1, pp 455–459
Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370
Funding
This is an independent work. No specific funding has been provided to conduct this research, either directly or indirectly.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declares that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sahu, A.K. A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Ambient Intell Human Comput 13, 3869–3881 (2022). https://doi.org/10.1007/s12652-021-03365-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03365-9