Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC

被引:0
作者
Priyadarshini, Priyanka [1 ]
Naik, Kshiramani [1 ]
机构
[1] School of Computer Science, VSS University of Technology, Sambalpur
关键词
LDPC; recovery; Schur decomposition; SPIHT; Tamper detection;
D O I
10.1080/1206212X.2024.2380650
中图分类号
学科分类号
摘要
In today’s digital landscape, the pervasive use of digital images across diverse domains has led to growing concerns regarding their authenticity and reliability. The potential for malicious manipulation of these images underscores the critical need to develop robust methods for detecting tampering and ensuring their integrity. Fragile watermarking has been found to have extensive applications for tamper detection and recovery. An image watermarking technique for tamper detection, correction, and recovery is presented in this study. The proposed method employs a self-embedding method to generate the reference watermark from the original image, which has the advantage of superior tamper detection, localization, recovery capabilities, and robustness against attacks. Set Partitioning in the Hierarchical Tree (SPIHT) algorithm is applied to generate a reference watermark of the original image. Low-Density Parity Check (LDPC) is employed for error correction, providing higher-quality reconstruction to recover the original image. Schur decomposition processed the watermarked image blocks to generate authentication bits for each block to enhance tampering detection. The proposed watermarking method was evaluated using PSNR, SSIM, BER, and NC metrics for grayscale and colored images. The technique demonstrated high robustness in tamper detection and recovery against various malicious attacks. Comparative analysis with existing methods shows the efficacy of the proposed method. © 2024 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:580 / 603
页数:23
相关论文
共 44 条
[1]  
Laouamer L., AlShaikh M., Nana L., Et al., Robust watermarking scheme and tamper detection based on threshold versus intensity, J Innov Dig Ecosyst, 2, 1-2, pp. 1-12, (2015)
[2]  
Lin E.T., Podilchuk C.I., Delp E.J., Detection of image alterations using semifragile watermarks, Security and watermarking of multimedia contents II, pp. 152-163, (2000)
[3]  
Yu M., Wang J., Jiang G., Et al., New fragile watermarking method for stereo image authentication with localization and recovery, AEU Int J Electron Commun, 69, 1, pp. 361-370, (2015)
[4]  
Nr N., Shreelekshmi R., Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition, J Vis Commun Image Represent, 85, (2022)
[5]  
Siddiqi M.H., Asghar K., Draz U., Et al., Image splicing-based forgery detection using discrete wavelet transform and edge weighted local binary patterns, Secur Commun Netw, pp. 1-10, (2021)
[6]  
Hwang M.G., Har D.H., Identification method for digital image forgery and filtering region through interpolation, J Forens Sci, 59, 5, pp. 1372-1385, (2014)
[7]  
Preda R.O., Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain, Measurement, 46, 1, pp. 367-373, (2013)
[8]  
Swaraja K., Meenakshi K., Kora P., An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine, Biomed Signal Process Contr, 55, (2020)
[9]  
Lefevre P., Carre P., Fontaine C., Et al., Efficient image tampering localization using semi-fragile watermarking and error control codes, Signal Process, 190, (2022)
[10]  
Freitas G., Rigoni P., Farias R., Et al., Bounded model checking for fixed-point digital filters, J Braz Comput Soc, 22, 1, pp. 1-13, (2016)