A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy

Intentional tampering in digital image content is one of the common malpractices in the current digital arena. So in this paper, the authors have proposed a novel fragile watermarking scheme for the localization of tampered image content effectively. Proposed fragile watermarking scheme detects forged image content robustly in block level of two consecutive pixels. In this work, the watermark embedding procedure is comprised of two phases- i.e., authentication code generation from some selected salient bits of each pixel of the original image content, and encryption of the authentication code before realizing it for embedding into the insignificant bits of each pixel in the original cover image. The authentication code is computed from each block using Hamming Code. Subsequently, the encrypted code is concealed into the pixels of that particular block using the suggested payload embedding strategy i.e., pixel adjustment process. The proposed fragile watermarking procedure ensures the high level of security since the encrypted authentication code is embedded into the cover image through an indirect mechanism i.e. block-level pixel adjustment process. This scheme has been implemented and tested on several grayscale images in order to confirm the tampering detection capability against various image manipulation attacks. The experimental results exhibit better performance in terms of various perceptual quality measures like peak signal to noise ratio, structural similarity index, and image fidelity. Further, the presented results demonstrate that the scheme is suitable for detecting whether a concerned image has undergone any form of tampering or not and achieves standard results in terms of false-positive rate, false-negative rate, true positive rate, tamper detection accuracy, and normalized cross-correlation.

[1]  Prabhishek Singh,et al.  A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .

[2]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[3]  Lei Fu,et al.  Image authentication scheme based on reversible fragile watermarking with two images , 2018, J. Inf. Secur. Appl..

[4]  Y. F. Chang,et al.  A block-based watermarking scheme for image tamper detection and self-recovery , 2013 .

[5]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[6]  Yue Chen,et al.  A novel chaos-based fragile watermarking for image tampering detection and self-recovery , 2013, Signal Process. Image Commun..

[7]  Majid Mollaeefar,et al.  An improved method for digital image fragile watermarking based on chaotic maps , 2017, Multimedia Tools and Applications.

[8]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[9]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[10]  Chin-Chen Chang,et al.  A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..

[11]  A. K. Pal,et al.  A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection , 2017, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.

[12]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[13]  Shan Suthaharan Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance , 2010, EURASIP J. Inf. Secur..

[14]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[15]  Shu-Fen Tu,et al.  Image tamper detection and recovery using adaptive embedding rules , 2016 .

[16]  V. Kamakshi Prasad,et al.  Improved image tamper localisation using chaotic maps and self-recovery , 2017, J. Vis. Commun. Image Represent..

[17]  Asoke K. Nandi,et al.  Fast fragile watermark embedding and iterative mechanism with high self-restoration performance , 2018, Digit. Signal Process..

[18]  Chin-Chen Chang,et al.  An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..

[19]  Sukhjeet K. Ranade,et al.  Image authentication and tamper detection using fragile watermarking in spatial domain , 2017 .

[20]  Xing Xin,et al.  A quantization-based semi-fragile watermarking scheme for image content authentication , 2011, J. Vis. Commun. Image Represent..

[21]  Frank Y. Shih,et al.  An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing , 2012 .

[22]  Chin-Chen Chang,et al.  Fragile image watermarking scheme based on VQ index sharing and self-embedding , 2015, Multimedia Tools and Applications.

[23]  Heng-Ming Tai,et al.  Chaos-based self-embedding fragile watermarking with flexible watermark payload , 2012, Multimedia Tools and Applications.

[24]  Tahereh Binazadeh,et al.  Flexible Structure Control of Unmatched Uncertain Nonlinear Systems via Passivity-based Sliding Mode Technique , 2017, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.

[25]  Jin Tang,et al.  Improved Reversible Image Authentication Scheme , 2016, Cognitive Computation.

[26]  Xing Xin,et al.  A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..

[27]  Fan Chen,et al.  Block-wise Fragile Watermarking Scheme Based on Scramble Encryption , 2007, 2007 Second International Conference on Bio-Inspired Computing: Theories and Applications.