A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy

被引:38
作者
Prasad, Shiv [1 ]
Pal, Arup Kumar [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Indian Inst Technol, Dhanbad 826004, Jbarlchand, India
关键词
Fragile watermarking; Hamming codes; Logistic-map; Tamper detection; IMAGE AUTHENTICATION SCHEME;
D O I
10.1007/s11042-019-08144-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intentional tampering in digital image content is one of the common malpractices in the current digital arena. So in this paper, the authors have proposed a novel fragile watermarking scheme for the localization of tampered image content effectively. Proposed fragile watermarking scheme detects forged image content robustly in block level of two consecutive pixels. In this work, the watermark embedding procedure is comprised of two phases- i.e., authentication code generation from some selected salient bits of each pixel of the original image content, and encryption of the authentication code before realizing it for embedding into the insignificant bits of each pixel in the original cover image. The authentication code is computed from each block using Hamming Code. Subsequently, the encrypted code is concealed into the pixels of that particular block using the suggested payload embedding strategy i.e., pixel adjustment process. The proposed fragile watermarking procedure ensures the high level of security since the encrypted authentication code is embedded into the cover image through an indirect mechanism i.e. block-level pixel adjustment process. This scheme has been implemented and tested on several grayscale images in order to confirm the tampering detection capability against various image manipulation attacks. The experimental results exhibit better performance in terms of various perceptual quality measures like peak signal to noise ratio, structural similarity index, and image fidelity. Further, the presented results demonstrate that the scheme is suitable for detecting whether a concerned image has undergone any form of tampering or not and achieves standard results in terms of false-positive rate, false-negative rate, true positive rate, tamper detection accuracy, and normalized cross-correlation.
引用
收藏
页码:1673 / 1705
页数:33
相关论文
共 26 条
[1]   Fast fragile watermark embedding and iterative mechanism with high self-restoration performance [J].
Bravo-Solorio, Sergio ;
Calderon, Felix ;
Li, Chang-Tsun ;
Nandi, Asoke K. .
DIGITAL SIGNAL PROCESSING, 2018, 73 :83-92
[2]   An efficient image authentication method based on Hamming code [J].
Chan, Chi-Shiang ;
Chang, Chin-Chen .
PATTERN RECOGNITION, 2007, 40 (02) :681-690
[3]   A secure fragile watermarking scheme based on chaos-and-hamming code [J].
Chang, Chin-Chen ;
Chen, Kuo-Nan ;
Lee, Chin-Feng ;
Liu, Li-Jen .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) :1462-1470
[4]   A block-based watermarking scheme for image tamper detection and self-recovery [J].
Chang, Y. -F. ;
Tai, W. -L. .
OPTO-ELECTRONICS REVIEW, 2013, 21 (02) :182-190
[5]   Chaos-based self-embedding fragile watermarking with flexible watermark payload [J].
Chen, Fan ;
He, Hongjie ;
Tai, Heng-Ming ;
Wang, Hongxia .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) :41-56
[6]   Block-wise Fragile Watermarking Scheme Based on Scramble Encryption [J].
He, Hongjie ;
Zhang, Jiashu ;
Chen, Fan .
2007 SECOND INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS, 2007, :216-+
[7]   Image tamper detection and recovery using adaptive embedding rules [J].
Hsu, Ching-Sheng ;
Tu, Shu-Fen .
MEASUREMENT, 2016, 88 :287-296
[8]   A novel reversible image authentication scheme for digital images [J].
Lo, Chun-Chi ;
Hu, Yu-Chen .
SIGNAL PROCESSING, 2014, 98 :174-185
[9]  
Lu C., 2005, MULTIMEDIA SECURITY
[10]   An improved method for digital image fragile watermarking based on chaotic maps [J].
Nazari, Mahboubeh ;
Sharif, Amir ;
Mollaeefar, Majid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16107-16123