Skip to main content
Log in

A logistic map based blind and fragile watermarking for tamper detection and localization in images

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In real-time data transmission, the protection of multimedia content from unauthorized access is pivotal. In this context, digital watermarking techniques have drawn significant attention from the past few decades. However, most of the reported techniques fail to achieve a good balance among the perceptual transparency, embedding capacity (EC), and robustness. Besides, tamper detection and localization are the two crucial aspects of any authentication based watermarking technique. This paper proposes a logistic map based fragile watermarking technique to efficiently detect and localize the tampered regions from the watermarked image (WI). The proposed technique takes advantage of the sensitivity property of the logistic map to generate the watermark bits. Next, these watermark bits are embedded in the rightmost least significant bits (LSBs) by performing the logical XOR operation between the first intermediate significant bits (ISBs) and the watermark bits. Simulation results show that the proposed technique can produce high quality WI with an average peak signal-to-noise ratio (PSNR) of 51.14 dB. Further, the proposed technique can efficiently detect and locate the tampering regions from the image with a high true positive rate, low false positive and negative rate. Additionally, the proposed technique exhibits an excellent ability to resist various intentional and unintentional attacks which makes it suitable for real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

My manuscript has no associated data.

References

  • Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  • Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2018.04.006

    Article  Google Scholar 

  • Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110

    Article  Google Scholar 

  • Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recognit Lett 27(5):439–446

    Article  Google Scholar 

  • Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  • Che S, Ma B, Che Z (2008) An adaptive and fragile image watermarking algorithm based on composite chaotic iterative dynamic system. In: IEEE 2008 international conference on intelligent information hiding and multimedia signal processing, pp 159–162

  • Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307

    Article  Google Scholar 

  • Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41–56

    Article  Google Scholar 

  • Cheng CJ, Hwang WJ, Zeng HY, Lin YC (2014) A fragile watermarking algorithm for hologram authentication. J Disp Technol 10(4):263–271

    Article  Google Scholar 

  • Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 78(13):17701–17718

    Article  Google Scholar 

  • Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Hum Comput 11(5):1799–1808

    Article  Google Scholar 

  • He H, Zhang J, Chen F (2007) Block-wise fragile watermarking scheme based on scramble encryption. In: IEEE 2007 second international conference on bio-inspired computing: theories and applications, pp 216–220

  • Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  • Hong, I, Kim, I, & Han, SS (2001) A blind watermarking technique using wavelet transform. In: ISIE 2001. In: IEEE international symposium on industrial electronics proceedings (Cat. No. 01TH8570), 3, pp 1946–1950

  • Korus P (2017) Digital image integrity–a survey of protection and verification techniques. Digital Signal Process 71:1–26

    Article  MathSciNet  Google Scholar 

  • Laouamer L, Al-Shaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innovation Digital Ecosyst 2(1–2):1–12

    Article  Google Scholar 

  • Mohanarathinam A, Kamalraj S, Venkatesan GP, Ravi RV, Manikandababu CS (2020) Digital watermarking techniques for image security: a review. J Ambient Intell Hum Comput. 11:3221–3229. https://doi.org/10.1007/s12652-019-01500-1

    Article  Google Scholar 

  • Mohsin AH, Zaidan AA, Zaidan BB, Bin-Ariffin SA, Albahri OS, Albahri AS, Alsalem M, Mohammed KI, Hashim M (2018) Real-time medical systems based on human biometric steganography: a systematic review. J Med Sys 42(12):1–20

    Google Scholar 

  • Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI, Nidhal S, Jalood NS, Jasim AN, Shareef AH (2019a) New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7:168994–169010

    Article  Google Scholar 

  • Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI (2019b) Based medical systems for patient’s authentication: towards a new verification secure framework using CIA standard. J Med Sys 43(7):1–34

    Article  Google Scholar 

  • Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107–16123

    Article  Google Scholar 

  • Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE 2012 international symposium on intelligent signal processing and communications systems, pp 430–435

  • Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3):1673–1705

    Article  Google Scholar 

  • Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 65(10):840–847

    Article  Google Scholar 

  • Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Adv Signal Process 2002(6):1–9

    Article  Google Scholar 

  • Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193–1218

    Article  Google Scholar 

  • Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit Lett 25(16):1893–1903

    Article  Google Scholar 

  • Suthaharan S (2010) Logistic map-based fragile watermarking for pixel level tamper detection and resistance. EURASIP J Inf Secur 2010(1):829516

    Google Scholar 

  • Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  • Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electric Eng 41(2):103–113

    Article  Google Scholar 

  • Walton S (1995) Information authentication for a slippery new age. Dr Dobb’s J 20(4):18–26

    Google Scholar 

  • Wong PW (1998a) A watermark for image integrity and ownership verification. In: PICS, pp 374–379

  • Wong PW (1998b) A public key watermark for image verification and authentication. In: Proceedings 1998 IEEE international conference on image processing. ICIP98 (Cat. No. 98CB36269), 1, pp 455–459

  • Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370

    Article  Google Scholar 

Download references

Funding

This is an independent work. No specific funding has been provided to conduct this research, either directly or indirectly.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aditya Kumar Sahu.

Ethics declarations

Conflict of interest

The author declares that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahu, A.K. A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Ambient Intell Human Comput 13, 3869–3881 (2022). https://doi.org/10.1007/s12652-021-03365-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03365-9

Keywords