Abstract
Intentional tampering in digital image content is one of the common malpractices in the current digital arena. So in this paper, the authors have proposed a novel fragile watermarking scheme for the localization of tampered image content effectively. Proposed fragile watermarking scheme detects forged image content robustly in block level of two consecutive pixels. In this work, the watermark embedding procedure is comprised of two phases- i.e., authentication code generation from some selected salient bits of each pixel of the original image content, and encryption of the authentication code before realizing it for embedding into the insignificant bits of each pixel in the original cover image. The authentication code is computed from each block using Hamming Code. Subsequently, the encrypted code is concealed into the pixels of that particular block using the suggested payload embedding strategy i.e., pixel adjustment process. The proposed fragile watermarking procedure ensures the high level of security since the encrypted authentication code is embedded into the cover image through an indirect mechanism i.e. block-level pixel adjustment process. This scheme has been implemented and tested on several grayscale images in order to confirm the tampering detection capability against various image manipulation attacks. The experimental results exhibit better performance in terms of various perceptual quality measures like peak signal to noise ratio, structural similarity index, and image fidelity. Further, the presented results demonstrate that the scheme is suitable for detecting whether a concerned image has undergone any form of tampering or not and achieves standard results in terms of false-positive rate, false-negative rate, true positive rate, tamper detection accuracy, and normalized cross-correlation.
Similar content being viewed by others
References
Bravo-Solorio S, Calderon F, Li C-T, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing 73:83–93
Chana C-S, Chang C-C (2007) An efficient image authentication method based on Hamming code. Pattern Recogn 40:681–690
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Chang Y-F, Tail W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review 21(2):182–190
Chen F, He H, Tai H-M, Wang H (2012) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41–56
He, H, Zhang, J, Chen, F (2007) Block-wise fragile watermarking scheme based on scramble encryption. In Bio-Inspired Computing: Theories and Applications, 2007. BIC-TA 2007. Second International Conference on (pp. 216–220). IEEE
Hsu C-S, Tu S-F (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296
Kaur Y, Ranade SK (2017) Image authentication and tamper detection using fragile watermarking in spatial domain. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) 6(7):1058–1063
Lo C-C, Hu Y-C (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–118
Lu C-S (2005) Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing
Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107–16123
Peng Y, Niu X, Fu L, Yin Z (2018) Image authentication scheme based on reversible fragile watermarking with two images. Journal of Information Security and Applications 40(2018):236–246
Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 23(2015):312–327
Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293
Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU) 65(10):840–847
Singh P, Chadha RS (2013) A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology 2(9):165–175
Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self-recovery. J Vis Commun Image Represent 49:164–176
Suthaharan S (2010, 2010) Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. EURASIP J Inf Secur:7
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308
Trivedy S, Pal AK (2017) A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41(2):1–11
William S (2007) Cryptography and Network Security: Principles and Practices. 4th Ed. India; Pearson Education
Wu D-C, Tsai W-H (2003) A Steganographic Method for Images by Pixel Value Differencing. Pattern Recogn Lett 24:1613–1626
Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post- processing. Opt Commun 285(10–11):2596–2606
Yin Z, Niu X, Zhou Z, Tang J, Luo B (2016) Improved reversible image authentication scheme. Cogn Comput 8(5):890–899
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Prasad, S., Pal, A.K. A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79, 1673–1705 (2020). https://doi.org/10.1007/s11042-019-08144-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08144-5