A novel hash function based fragile watermarking method for image integrity

In recent years, tampering and altering of digital images have become easier with the rapid development of computer technologies such as digital image editing tools. Therefore, verification of image integrity and tamper detection of digital images have become a great challenge. Fragile watermarking is the most widely used method for protecting the integrity and content authenticity of the image. In this paper, by using SHA-256 hash function, a novel block based fragile watermark embedding and tamper detection method is proposed. In watermark embedding phase, host image is divided into 32 × 32 non-overlapped blocks. Each 32 × 32 block is then divided into four 16 × 16 nonoverlapped sub-blocks. The entire hash value of the first three sub-blocks is generated as a watermark using SHA-256 hash function. The generated 256-bit binary watermark is embedded into the least significant bits (LSBs) of the fourth sub-block and watermarked image is obtained. In tamper detection phase, the detection of tampered block has been performed by comparing the hash value obtained from the three sub-blocks with the extracted watermark from the fourth sub-block of the watermarked image. The performance of the proposed method has been evaluated by applying linear and nonlinear attacks to the different regions of the watermarked images. Experimental results show that the proposed method detects all the tampered regions of the attacked images and high visual quality of watermarked images has been obtained.

[1]  Hussain Al-Ahmad,et al.  A reversible watermarking scheme for ownership protection and authentication of medical Images , 2017, 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA).

[2]  Gaurav Agarwal,et al.  Tamper Detection Using Fragile Image Watermarking Based on Chaotic System , 2018 .

[3]  M. Sasikumar,et al.  A Benchmark for Medical Image Watermarking , 2007, 2007 14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services.

[4]  Xiao Zhou,et al.  Fragile Watermarking Based on LBP for Blind Tamper Detection in Images , 2017, J. Inf. Process. Syst..

[5]  Rajib Kumar Jha,et al.  Significant region based robust watermarking scheme in lifting wavelet transform domain , 2015, Expert Syst. Appl..

[6]  Amit Kumar Singh,et al.  Wavelet Based Image Watermarking: Futuristic Concepts in Information Security , 2014, Proceedings of the National Academy of Sciences, India Section A: Physical Sciences.

[7]  Güzin Ulutas,et al.  A New Medical Image Watermarking Technique with Finer Tamper Localization , 2017, Journal of Digital Imaging.

[8]  Mei Yu,et al.  New fragile watermarking method for stereo image authentication with localization and recovery , 2015 .

[9]  Xinpeng Zhang,et al.  Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..

[10]  Bravo-SolorioSergio,et al.  Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011 .

[11]  V. Santhi,et al.  Spatial Domain Blind Watermarking for Digital Images , 2018 .

[12]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[13]  Sahib Khan,et al.  On combining MD5 for image authentication using LSB substitution in selected pixels , 2018, 2018 International Conference on Engineering and Emerging Technologies (ICEET).

[14]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[15]  Hong Heather Yu,et al.  Classification of video tampering methods and countermeasures using digital watermarking , 2001, SPIE ITCom.

[16]  Hussain Al-Ahmad,et al.  A New Watermarking Algorithm for Color Satellite Images Using Color Logos and Hash Functions , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[17]  Malay Kumar Kundu,et al.  Effective management of medical information through ROI-lossless fragile image watermarking technique , 2013, Comput. Methods Programs Biomed..

[18]  Amit Kumar Singh,et al.  Robust and Secure Multiple Watermarking Technique for Application in Tele-Ophthalmology , 2017 .

[19]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[20]  Qingtang Su,et al.  Robust color image watermarking technique in the spatial domain , 2018, Soft Comput..

[21]  Chinchen Chang,et al.  A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain , 2016 .

[22]  Asoke K. Nandi,et al.  Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011, Signal Process..

[23]  Ronald M. Summers,et al.  ChestX-ray: Hospital-Scale Chest X-ray Database and Benchmarks on Weakly Supervised Classification and Localization of Common Thorax Diseases , 2019, Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics.

[24]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[25]  A. K. Pal,et al.  A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection , 2017, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.

[26]  C-C Chang,et al.  Novel image authentication scheme based on quadtree segmentation , 2005 .

[27]  Majid Mollaeefar,et al.  An improved method for digital image fragile watermarking based on chaotic maps , 2017, Multimedia Tools and Applications.

[28]  Veysel Aslantas,et al.  DWT-SVD based image watermarking using Particle Swarm Optimizer , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[29]  Nidhi H. Divecha,et al.  A Feature-Based Semi-fragile Watermarking Algorithm for Digital Color Image Authentication Using Hybrid Transform , 2018 .

[30]  V. Kamakshi Prasad,et al.  Fragile watermarking schemes for image authentication: a survey , 2017, International Journal of Machine Learning and Cybernetics.

[31]  Jean-Yves Chouinard,et al.  Optimal Image Watermarking Algorithm Based on LWT-SVD via Multi-objective Ant Colony Optimization , 2011, J. Inf. Hiding Multim. Signal Process..

[32]  Hou Jian-jun DCT-Domain Fragile Watermarking Algorithm Based on Logistic Maps , 2006 .

[33]  Shu-Fen Tu,et al.  Probability-based tampering detection scheme for digital images , 2010 .

[34]  Zhoufeng Liu,et al.  Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication , 2014, Multimedia Tools and Applications.

[35]  V. Aslantaş,et al.  Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms , 2009 .

[36]  Saban Ozer,et al.  A novel fragile watermarking based on Particle Swarm Optimization , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[37]  J. K. Mandal,et al.  Binomial transform based fragile watermarking for image authentication , 2014, J. Inf. Secur. Appl..

[38]  Durgesh Singh,et al.  DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.

[39]  Saban Ozer,et al.  A Novel Clonal Selection Algorithm Based Fragile Watermarking Method , 2007, ICARIS.

[40]  ماجد جبار جواد الفنهراوي A semi-Fragile Watermarking Based Image Authentication , 2017 .

[41]  Chang-Tsun Li,et al.  Wavelet-based fragile watermarking scheme for image authentication , 2007, J. Electronic Imaging.

[42]  Dilip Kumar Shaw,et al.  Experimental Studies of LSB Watermarking with Different Noise , 2015 .

[43]  P. P. Deepthi,et al.  An Integrity Verification System for Images Using Hashing and Watermarking , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[44]  Puvvadi Aparna,et al.  An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm , 2018, J. Intell. Syst..

[45]  Prabhishek Singh,et al.  A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .

[46]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[47]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[48]  Mingquan Zhou,et al.  A novel SVD and LS-SVM combination algorithm for blind watermarking , 2014, Neurocomputing.

[49]  Chin-Chen Chang,et al.  Fragile image watermarking scheme based on VQ index sharing and self-embedding , 2015, Multimedia Tools and Applications.

[50]  Amit Kumar Singh,et al.  A recent survey on image watermarking techniques and its application in e-governance , 2018, Multimedia Tools and Applications.

[51]  Gang Wang,et al.  A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition , 2016, Multimedia Tools and Applications.

[52]  Xinpeng Zhang,et al.  Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..

[53]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[54]  Tung-Shou Chen,et al.  An efficient reversible image authentication method using improved PVO and LSB substitution techniques , 2017, Signal Process. Image Commun..

[55]  Suneeta Agarwal,et al.  A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.

[56]  Millie Pant,et al.  An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional Fourier transforms , 2018, Multimedia Tools and Applications.

[57]  Zhongmeng Zhao,et al.  Self-embedding fragile watermarking based on DCT and fast fractal coding , 2014, Multimedia Tools and Applications.

[58]  Wu-Lin Chen,et al.  Probability-based reversible image authentication scheme for image demosaicking , 2016, Future Gener. Comput. Syst..

[59]  Bin Ma,et al.  Multi-block dependency based fragile watermarking scheme for fingerprint images protection , 2013, Multimedia Tools and Applications.

[60]  Amit Kumar Singh,et al.  Iris based secure NROI multiple eye image watermarking for teleophthalmology , 2016, Multimedia Tools and Applications.

[61]  Jasni Mohamad Zain,et al.  Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images , 2017, Journal of Digital Imaging.