Approximate regeneration of image using fragile watermarking for tamper detection and recovery in real time

被引:1
作者
Sisaudia, Varsha [1 ]
Vishwakarma, Virendra P. [2 ]
机构
[1] Delhi Technol Univ, Delhi, India
[2] GGSIPU, Univ Sch Informat & Commun Technol, Delhi, India
关键词
Fragile watermarking; Tamper detection; Local binary pattern; Image reconstruction; BLIND WATERMARKING; AUTHENTICATION; ALGORITHM; SCHEME; DCT;
D O I
10.1007/s11042-024-18247-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Image Watermarking has been rigorously used for image authenticity problems. Fragile watermarking is sensitive to even slight modifications and can detect tampering. This paper proposes a real-time tamper detection algorithm and regenerates an approximate image for the tampered locations. The image is divided into 4 parts and pair-wise correspondence is formed. This correspondence is used for marking the authenticity of parts of images and helps in the reconstruction of tampered parts. For every part, sub-blocks of size 4 x 4 are formed. Upon calculating the average of 4 inner pixels of these 4 x 4 blocks, a Local Binary Pattern (LBP) is constructed for that sub-block. Using XOR operation on 12-bit LBP, a 6-bit watermark for that sub-block is generated. This watermark is used for block authentication. Next, for recovery information, the 4 x 4 sub-block is divided into four 2 x 2 parts, and their average is calculated. This information is used for the recovery of tampered regions in the image. The watermark along with the average is then embedded into the corresponding sub-block in the pair-wise section of the image. This helps ensure the authenticity of the sub-block and helps in storing information needed for regeneration in case a part of the watermarked image has been tampered with. The imperceptibility and extent of degradation of the original image upon embedding the watermarking bits are calculated using the peak signal-to-noise ratio and structural similarity index. The approach is tested against a variety of attacks and shows its applicability in real-time applications with quick approximate reconstruction.
引用
收藏
页码:66299 / 66318
页数:20
相关论文
共 50 条
[21]   Semi-fragile watermarking for tamper detection [J].
Lin, KZ ;
Xiong, CF ;
Ma, Q ;
Sun, H .
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, :193-198
[23]   Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering [J].
Assem Abdelhakim ;
Hassan I. Saleh ;
Mai Abdelhakim .
Multimedia Tools and Applications, 2019, 78 :32523-32563
[24]   Multipurpose Image Watermarking: Ownership Check, Tamper Detection and Self-recovery [J].
Sinhal, Rishi ;
Ansari, Irshad Ahmad .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2022, 41 (06) :3199-3221
[25]   Fuzzy Transforms and Fragile Watermarking Tamper Detection on Coded Images [J].
Di Martino, Ferdinando ;
Sessa, Salvatore .
PROCEEDINGS OF THE 7TH CONFERENCE OF THE EUROPEAN SOCIETY FOR FUZZY LOGIC AND TECHNOLOGY (EUSFLAT-2011) AND LFA-2011, 2011, :444-451
[26]   A block-based fragile watermarking scheme for digital image authentication and tamper recovery [J].
Swain M. ;
Swain D. .
International Journal of Reasoning-based Intelligent Systems, 2024, 16 (01) :1-7
[27]   Fragile watermarking tamper detection with images compressed by fuzzy transform [J].
Di Martino, Ferdinando ;
Sessa, Salvatore .
INFORMATION SCIENCES, 2012, 195 :62-90
[28]   A logistic map based blind and fragile watermarking for tamper detection and localization in images [J].
Sahu, Aditya Kumar .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) :3869-3881
[29]   A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT [J].
Nandhini Sivasubramanian ;
Gunaseelan Konganathan .
Computing, 2020, 102 :1365-1384
[30]   Reversible Medical Image Watermarking For Tamper Detection And Recovery [J].
Liew, Siau-Chuin ;
Zain, Jasni Mohamad .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, :417-420