A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking

被引:6
作者
Prasad, Shiv [1 ]
Pal, Arup Kumar [1 ]
Paul, Srilekha [1 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Watermark; authentication code; Fragile watermarking; Image tamper detection; Logistic-map; Modulus function; LOCALIZATION;
D O I
10.1007/s11277-022-09675-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Intentional illegitimate modification in any digital image data is one of the general malversations in the existing digital domain. Therefore in this work, the authors have devised a fragile watermarking technique for the localization of illegitimate modifications in the digital image content effectually. The proposed technique detects forged digital image content strongly in the block-level of two successive pixels. This scheme is performed at the block level, where the actual image is partitioned into non-overlapping blocks of size (1 x 2) pixels. Afterward, the block-level authentication code is generated from the MSB of two successive pixels of each block using averaging and modulus operations. The generated authentication code/watermark is encrypted using a logistic-map-based chaotic key series. The encrypted authentication code is embedded into two successive pixels of the corresponding block. Further, any form of forgery in the watermarked image can be detected by comparing its extracted authentication code and regenerated authentication code. The proposed procedure is successfully experienced on a variety of grayscale images, and the experimental results exhibit that watermarked images generated by this scheme are of considerably high quality in terms of PSNR, IF, and SSIM. The proposed method is capable of efficient forgery detection by achieving very high accuracy, NC, and true positive rate while maintaining considerably low false-positive and false-negative rates.
引用
收藏
页码:2581 / 2619
页数:39
相关论文
共 22 条
  • [1] Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
    Bravo-Solorio, Sergio
    Nandi, Asoke K.
    [J]. SIGNAL PROCESSING, 2011, 91 (04) : 728 - 739
  • [2] A secure fragile watermarking scheme based on chaos-and-hamming code
    Chang, Chin-Chen
    Chen, Kuo-Nan
    Lee, Chin-Feng
    Liu, Li-Jen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1462 - 1470
  • [3] A block-based watermarking scheme for image tamper detection and self-recovery
    Chang, Y. -F.
    Tai, W. -L.
    [J]. OPTO-ELECTRONICS REVIEW, 2013, 21 (02) : 182 - 190
  • [4] HE H, 2007, 2 INT C BIOINSP COMP
  • [5] Probability-based tampering detection scheme for digital images
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (09) : 1737 - 1743
  • [6] Lu C., 2005, MULTIMEDIA SECURITY
  • [7] An improved method for digital image fragile watermarking based on chaotic maps
    Nazari, Mahboubeh
    Sharif, Amir
    Mollaeefar, Majid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16107 - 16123
  • [8] Scalable fragile watermarking for image authentication
    Piper, Angela
    Safavi-Naini, Reihaneh
    [J]. IET INFORMATION SECURITY, 2013, 7 (04) : 300 - 311
  • [9] Prasad Shiv, 2019, Emerging Technologies in Data Mining and Information Security. Proceedings of IEMIS 2018. Advances in Intelligent Systems and Computing (AISC 814), P203, DOI 10.1007/978-981-13-1501-5_17
  • [10] A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images
    Prasad, Shiv
    Pal, Arup Kumar
    [J]. IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2020, 44 (02) : 703 - 727