A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images

被引:13
作者
Prasad, Shiv [1 ]
Pal, Arup Kumar [1 ]
机构
[1] Indian Sch Mines, Indian Inst Technol, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Authentication code; Fragile watermarking; Logistic map; Tamper detection; TAMPERING DETECTION; SYSTEM; IMPROVEMENT; ATTACK;
D O I
10.1007/s40998-019-00275-7
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fragile watermarking is one of the integrity protection mechanisms of multimedia data like image, video, and audio. A secure fragile image watermarking scheme, which is used to detect modification or tampering occurred on the image content, is devised in this paper. The projected scheme is developed into two steps, i.e., computation of secure authentication code/watermark bit from some of the most significant bits of each pixel, and subsequently hides the watermark bit in the least significant bit (LSB) of each pixel by suggested watermark embedding procedure. The watermark bit is concealed into the LSB position of each pixel by a secret sequence obtained from a logistic map. This procedure boosts the security since without knowing the secret sequence, the authentication code extraction from each pixel is not possible. The suggested watermarking approach is assessed on a set of grayscale images, and a decent quality of the watermarked image is visualized. After performing several malicious tampering attacks on the watermarked images, the results of the experiment depict that the tamper detection procedure can effectively locate or identify the altered region from the watermarked image. The scheme is also evaluated based on different estimated quantity parameters like PSNR, FPR, FNR, and Image Fidelity, and satisfactory results are attained.
引用
收藏
页码:703 / 727
页数:25
相关论文
共 32 条
  • [1] [Anonymous], 2012, INF SCI
  • [2] A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection
    Botta, Marco
    Cavagnino, Davide
    Pomponiu, Victor
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (01) : 242 - 245
  • [3] A secure fragile watermarking scheme based on chaos-and-hamming code
    Chang, Chin-Chen
    Chen, Kuo-Nan
    Lee, Chin-Feng
    Liu, Li-Jen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1462 - 1470
  • [4] A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
    Chen, Wei-Che
    Wang, Ming-Shi
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) : 1300 - 1307
  • [5] Gauravaram P, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P59, DOI 10.1007/978-3-642-04117-4_4
  • [6] A restorable fragile watermarking scheme with superior localization for both natural and text images
    Hemida, Omer
    Huo, Yaoran
    He, Hongjie
    Chen, Fan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 12373 - 12403
  • [7] Probability-based tampering detection scheme for digital images
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (09) : 1737 - 1743
  • [8] Fragile Watermarking of Decision System Using Rough Set Theory
    Khanduja, Vidhi
    Chakraverty, Shampa
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7621 - 7633
  • [9] Batch verification of Digital Signatures: Approaches and challenges
    Kittur, Apurva S.
    Pais, Alwyn Roshan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 15 - 27
  • [10] Attack and Improvement of the Fidelity Preserved Fragile Watermarking of Digital Images
    Li, Ming
    Xiao, Di
    Zhang, Yushu
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 941 - 950