Skip to main content
Log in

Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K-means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35

Similar content being viewed by others

References

  1. Benrhouma O, Hermassi H, El-Latif AAA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718

    Article  Google Scholar 

  2. Bohra A, Farooq O (2009) Blind self-authentication of images for robust watermarking using integer wavelet transform. AEU-International Journal of Electronics and Communications 63(8):703–707

    Article  Google Scholar 

  3. Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60

    Article  Google Scholar 

  4. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595

    Article  Google Scholar 

  5. Chang C-C, Fan Y-H, Tai W-L (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661

    Article  MATH  Google Scholar 

  6. De Vleeschouwer C, Delaigle J-F, Macq B (2002) Invisibility and application functionalities in perceptual watermarking an overview. Proc IEEE 90(1):64–77

    Article  Google Scholar 

  7. Di Martino F, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195:62–90

    Article  Google Scholar 

  8. El'arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626

    Article  Google Scholar 

  9. Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25

    Article  Google Scholar 

  10. Gareth J (2010) An introduction to statistical learning: with applications in R. Springer

  11. Ghosal S, Mandal J (2014) Binomial transform based fragile watermarking for image authentication. Journal of Information Security and Applications 19(4–5):272–281

    Article  Google Scholar 

  12. Hasan Y, Hassan A (2004) Fragile blockwise image authentication thwarting vector quantization attack. Paper presented at the Signal Processing and Information Technology, 2004. Proceedings of the Fourth IEEE International Symposium on,

  13. He H, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security 7(1):185–196

    Article  Google Scholar 

  14. He H, Zhang J, Chen F (2007) Block-wise fragile watermarking scheme based on scramble encryption. Paper presented at the Bio-Inspired Computing: Theories and Applications, 2007. BIC-TA 2007. Second International Conference on,

  15. Ho AT, Zhu X, Shen J, Marziliano P (2008) Fragile Watermarking Based on Encoding of the Zeroes of the $ z $-Transform. IEEE Transactions on Information Forensics and Security 3(3):567–569

    Article  Google Scholar 

  16. Hsu C-S, Tu S-F (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296

    Article  Google Scholar 

  17. Huang P-W, Peng A-W, Lin P-L (2004) VQ Attack Resilient and Tamper Proofing Digital Watermark for Image Authentication and Recovery

  18. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  MATH  Google Scholar 

  19. Kumar A, Ghrera S, Tyagi V (2015) A new and efficient buyer-seller digital Watermarking protocol using identity based technique for copyright protection. In: 2015 Third International Conference on Image Information Processing (ICIIP). IEEE, pp 531–535

  20. Kumar A, Ghrera S, Tyagi V (2017) An ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright Protection. Pertanika Journal of Science & Technology 25(1)

  21. Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  22. Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454

    Article  MathSciNet  Google Scholar 

  23. Mahdian B, Saic S (2010) Blind methods for detecting image fakery. IEEE Aerosp Electron Syst Mag 25(4):18–24

    Article  Google Scholar 

  24. Mehta R, Rajpal N, Vishwakarma VP (2018) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern 9(1):145–161

    Article  Google Scholar 

  25. Nguyen T-S, Chang C-C, Yang X-Q (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-International Journal of Electronics and Communications 70(8):1055–1061

    Article  Google Scholar 

  26. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Processing 21(2):278–286

    Article  Google Scholar 

  27. Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287

    Article  Google Scholar 

  28. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  29. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  30. Singh B, Sharma KD, Jatav LS (2014) New robust watermarking approach for image authentication. Paper presented at the Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on,

  31. Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent interactive technologies and multimedia. Springer, pp 111–122

  32. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Article  Google Scholar 

  33. Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  34. Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25(16):1893–1903

    Article  Google Scholar 

  35. Walia E, Suneja A (2014) A robust watermark authentication technique based on Weber’s descriptor. SIViP 8(5):859–872

    Article  Google Scholar 

  36. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  37. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  38. Yang H, Kot AC (2006) Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE signal Processing Letters 13(12):741–744

    Article  Google Scholar 

  39. Yang C-W, Shen J-J (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343

    Article  MATH  Google Scholar 

  40. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Transactions on Information Forensics and Security 6(4):1223–1232

    Article  Google Scholar 

  41. Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Processing Letters 14(10):727–730

    Article  Google Scholar 

  42. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Transactions on Multimedia 10(8):1490–1499

    Article  Google Scholar 

  43. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

  44. Zhao Y, Chen Z, Zhu C, Tan Y-P, Yu L (2011) Binocular just-noticeable-difference model for stereoscopic images. IEEE Signal Processing Letters 18(1):19–22

    Article  Google Scholar 

  45. Zhou W, Yu L, Wang Z, Wu M, Luo T, Sun L (2016) Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images. AEU-International Journal of Electronics and Communications 70(1):77–84

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Assem Abdelhakim.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdelhakim, A., Saleh, H.I. & Abdelhakim, M. Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed Tools Appl 78, 32523–32563 (2019). https://doi.org/10.1007/s11042-019-07986-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07986-3

Keywords

Navigation