Detection of Tampering in Image Using Watermarking

In the last few years there is a tremendous development in the area of high quality digital camera technology. So our life is full of the use of these digital images. However now a days there are lot of software (for example Photoshop, Photoscape, Photoplus and Picasa etc.) that can be used to modify these digital image. Therefore we cannot use these images as a proof or evidence. Therefore detection of tampering in image is important issue for forensic department. This paper presents digital watermarking for detection of tampering in image and improve the security of image. We worked on RGB components such as red, green and blue.3-DWT applied on RGB components for better results and chaos based encryption is used for security of watermark image. The proposed scheme provides high security and localizes tampered areas in tampered watermarked image.

[1]  Madhuri Rajawat,et al.  A Secure Watermarking and Tampering Detection Technique on RGB Image Using 2 Level DWT , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[2]  Akio Ogihara,et al.  Digital watermarking method for tamper detection and recovery of JPEG images , 2010, 2010 International Symposium On Information Theory & Its Applications.

[3]  Munaga V. N. K. Prasad,et al.  Efficient image tamper detection and recovery technique using dual watermark , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[4]  Toshiaki Kondo,et al.  An image tamper detection and recovery method based on self-embedding dual watermarking , 2015, 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).

[5]  Md. Foisal Hossain,et al.  An image fragile watermarking scheme based on chaotic system for image tamper detection , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).

[6]  Prashasti Kanikar,et al.  Pixel Based Digital Image Forgery Detection Techniques , 2012 .

[7]  Nitin N. Patil,et al.  Authentication and tamper detection in images using dual watermarking approach , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.

[8]  Hongbin Zhang,et al.  Image Tamper Detection and Recovery Using Dual Watermark , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[9]  Po-Whei Huang,et al.  A fragile watermarking scheme for image authentication with localization and recovery , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.

[10]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .

[11]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[12]  Jun-Dong Chang,et al.  LBP-based fragile watermarking scheme for image tamper detection and recovery , 2013, 2013 International Symposium on Next-Generation Electronics.

[13]  Nitin N. Patil,et al.  Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery Using Self Recovery Blocks , 2015, 2015 International Conference on Computing Communication Control and Automation.

[14]  Prasad Patil,et al.  Fragile Watermarking Scheme for Image Tamper Detection , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[15]  Chin-Chen Chang,et al.  A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[16]  Fang Ma,et al.  A Blind Watermarking Technology Based on DCT Domain , 2012, 2012 International Conference on Computer Science and Service System.

[17]  Juan Wang,et al.  A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks , 2011, 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing.

[18]  Héctor M. Pérez Meana,et al.  Watermarking-based tamper detection and recovery algorithms for official documents , 2011, 2011 8th International Conference on Electrical Engineering, Computing Science and Automatic Control.