Skip to main content
Log in

A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Intentional tampering in digital image content is one of the common malpractices in the current digital arena. So in this paper, the authors have proposed a novel fragile watermarking scheme for the localization of tampered image content effectively. Proposed fragile watermarking scheme detects forged image content robustly in block level of two consecutive pixels. In this work, the watermark embedding procedure is comprised of two phases- i.e., authentication code generation from some selected salient bits of each pixel of the original image content, and encryption of the authentication code before realizing it for embedding into the insignificant bits of each pixel in the original cover image. The authentication code is computed from each block using Hamming Code. Subsequently, the encrypted code is concealed into the pixels of that particular block using the suggested payload embedding strategy i.e., pixel adjustment process. The proposed fragile watermarking procedure ensures the high level of security since the encrypted authentication code is embedded into the cover image through an indirect mechanism i.e. block-level pixel adjustment process. This scheme has been implemented and tested on several grayscale images in order to confirm the tampering detection capability against various image manipulation attacks. The experimental results exhibit better performance in terms of various perceptual quality measures like peak signal to noise ratio, structural similarity index, and image fidelity. Further, the presented results demonstrate that the scheme is suitable for detecting whether a concerned image has undergone any form of tampering or not and achieves standard results in terms of false-positive rate, false-negative rate, true positive rate, tamper detection accuracy, and normalized cross-correlation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig.14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35

Similar content being viewed by others

References

  1. Bravo-Solorio S, Calderon F, Li C-T, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing 73:83–93

    Article  MathSciNet  Google Scholar 

  2. Chana C-S, Chang C-C (2007) An efficient image authentication method based on Hamming code. Pattern Recogn 40:681–690

    Article  Google Scholar 

  3. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  4. Chang Y-F, Tail W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review 21(2):182–190

    Article  Google Scholar 

  5. Chen F, He H, Tai H-M, Wang H (2012) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41–56

    Article  Google Scholar 

  6. He, H, Zhang, J, Chen, F (2007) Block-wise fragile watermarking scheme based on scramble encryption. In Bio-Inspired Computing: Theories and Applications, 2007. BIC-TA 2007. Second International Conference on (pp. 216–220). IEEE

  7. Hsu C-S, Tu S-F (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296

    Article  Google Scholar 

  8. Kaur Y, Ranade SK (2017) Image authentication and tamper detection using fragile watermarking in spatial domain. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) 6(7):1058–1063

    Google Scholar 

  9. Lo C-C, Hu Y-C (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–118

    Article  Google Scholar 

  10. Lu C-S (2005) Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing

  11. Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107–16123

    Article  Google Scholar 

  12. Peng Y, Niu X, Fu L, Yin Z (2018) Image authentication scheme based on reversible fragile watermarking with two images. Journal of Information Security and Applications 40(2018):236–246

    Article  Google Scholar 

  13. Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200

    Article  Google Scholar 

  14. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 23(2015):312–327

    Article  Google Scholar 

  15. Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287

    Article  Google Scholar 

  16. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  17. Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU) 65(10):840–847

    Article  Google Scholar 

  18. Singh P, Chadha RS (2013) A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology 2(9):165–175

    Google Scholar 

  19. Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self-recovery. J Vis Commun Image Represent 49:164–176

    Article  Google Scholar 

  20. Suthaharan S (2010, 2010) Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. EURASIP J Inf Secur:7

  21. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  22. Trivedy S, Pal AK (2017) A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41(2):1–11

    Article  Google Scholar 

  23. William S (2007) Cryptography and Network Security: Principles and Practices. 4th Ed. India; Pearson Education

  24. Wu D-C, Tsai W-H (2003) A Steganographic Method for Images by Pixel Value Differencing. Pattern Recogn Lett 24:1613–1626

    Article  Google Scholar 

  25. Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post- processing. Opt Commun 285(10–11):2596–2606

    Article  Google Scholar 

  26. Yin Z, Niu X, Zhou Z, Tang J, Luo B (2016) Improved reversible image authentication scheme. Cogn Comput 8(5):890–899

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiv Prasad.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prasad, S., Pal, A.K. A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79, 1673–1705 (2020). https://doi.org/10.1007/s11042-019-08144-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08144-5

Keywords

Navigation