A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy

被引:1
作者
Shiv Prasad
Arup Kumar Pal
机构
[1] Indian Institute of Technology (Indian School of Mines),Department of Computer Science and Engineering
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Fragile watermarking; Hamming codes; Logistic-map; Tamper detection;
D O I
暂无
中图分类号
学科分类号
摘要
Intentional tampering in digital image content is one of the common malpractices in the current digital arena. So in this paper, the authors have proposed a novel fragile watermarking scheme for the localization of tampered image content effectively. Proposed fragile watermarking scheme detects forged image content robustly in block level of two consecutive pixels. In this work, the watermark embedding procedure is comprised of two phases- i.e., authentication code generation from some selected salient bits of each pixel of the original image content, and encryption of the authentication code before realizing it for embedding into the insignificant bits of each pixel in the original cover image. The authentication code is computed from each block using Hamming Code. Subsequently, the encrypted code is concealed into the pixels of that particular block using the suggested payload embedding strategy i.e., pixel adjustment process. The proposed fragile watermarking procedure ensures the high level of security since the encrypted authentication code is embedded into the cover image through an indirect mechanism i.e. block-level pixel adjustment process. This scheme has been implemented and tested on several grayscale images in order to confirm the tampering detection capability against various image manipulation attacks. The experimental results exhibit better performance in terms of various perceptual quality measures like peak signal to noise ratio, structural similarity index, and image fidelity. Further, the presented results demonstrate that the scheme is suitable for detecting whether a concerned image has undergone any form of tampering or not and achieves standard results in terms of false-positive rate, false-negative rate, true positive rate, tamper detection accuracy, and normalized cross-correlation.
引用
收藏
页码:1673 / 1705
页数:32
相关论文
共 62 条
  • [1] Bravo-Solorio S(2018)Fast fragile watermark embedding and iterative mechanism with high self-restoration performance Digital Signal Processing 73 83-93
  • [2] Calderon F(2007)An efficient image authentication method based on Hamming code Pattern Recogn 40 681-690
  • [3] Li C-T(2011)A secure fragile watermarking scheme based on chaos-and-hamming code J Syst Softw 84 1462-1470
  • [4] Nandi AK(2013)A block-based watermarking scheme for image tamper detection and self-recovery Opto-Electronics Review 21 182-190
  • [5] Chana C-S(2012)Chaos-based self-embedding fragile watermarking with flexible watermark payload Multimed Tools Appl 72 41-56
  • [6] Chang C-C(2016)Image tamper detection and recovery using adaptive embedding rules Measurement 88 287-296
  • [7] Chang CC(2017)Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) 6 1058-1063
  • [8] Chen KN(2014)A novel reversible image authentication scheme for digital images Signal Process 98 174-118
  • [9] Lee CF(2017)An improved method for digital image fragile watermarking based on chaotic maps Multimed Tools Appl 76 16107-16123
  • [10] Liu LJ(2018)Image authentication scheme based on reversible fragile watermarking with two images Journal of Information Security and Applications 40 236-246