Abstract
Internet use has become a staple of our lives to transfer data. Although anyone can alter or modify these data, as image modifying tools are readily available. The slightest change in the medical image can lead to a wrong diagnosis, and the vital goal is not achieved. Tamper detection has been proposed as a solution for ensuring the integrity and authenticity of digital images. The goal is to identify and pinpoint any image changes that have taken place after transmission. An innovative watermarking technique is presented in this paper for detecting tampering. The approach relies on the Code Division Multiple Access (CDMA) technique. In order to generate the Common Code (watermark) data, the blocks must be encoded, followed by a Walsh table. This embedding process occurs in the LSB of each block. During the semi-blind detection step, the encode (data representation) matrix is necessary during the verification and detection steps. The proposed approach evaluated various types of attacks and tampered processes. According to the results of the experiments, the proposed approach outperforms existing and related approaches in terms of quality, imperceptibility, capacity, and tamper detection. The proposed method is evaluated using the Stirmark benchmark and CASIA v2 dataset. The approach provides a high quality and there is no degradation after embedding the watermark in the original image. Also, the watermarked approach is imperceptible where the PSNR is 56.4 dB and the SSIM is 0.9983, it consumes less space in the original image, its bPP is 0.85. In addition, it requires less computational resources than other approaches with an embedding and extraction time of 3.798 s. Further, the detection performance of the tampered data is 99.965. In addition, the approach provides promising results against spliced tampering, with an average F1 score of 0.8969.
Similar content being viewed by others
References
Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 1–16
AlShaikh M, Laouamer L, Nana L, Pascu A (2016) A novel CT scan images watermarking scheme in DWT transform coefficients. IJCSNS 16(1):62
AlShaikh M, Nana L, Laouamer L, Christine A (2016) Formal concept analysis to improve robustness on medical image watermarking schemes in the spatial domain. Int J Comput Sci Inf Secur 14(2):261
AlShaikh M, Laouamer L, Nana L, Pascu AC (2017) Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76(6):8937–8950
AlShaikh M, Laouamer L, Laouid A, Bounceur A, Hammoudeh M (2019) Robust and imperceptible medical image watermarking based on dijkstra algorithm. In: Proceedings of the 3rd international conference on future networks and distributed systems, pp 1–6
Bahrami K, Kot AC, Li L, Li H (2015) Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur 10(5):999–1009
Barani MJ, Valandar MY, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205–222
Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Appl 75(14):8695–8718
Bikov D, Bouyukliev I (2018) Parallel fast Walsh transform algorithm and its implementation with CUDA on GPUs. Cybern Inf Technol 18(5):21–43
Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446
Chang JD, Chen BH, Tsai CS (2013). LBP-based fragile watermarking scheme for image tamper detection and recovery. In: 2013 international symposium on next-generation electronics. IEEE, pp 173–176
Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307
Chen TS, Hou KN, Beh WK, Wu AY (2019) Low-complexity compressed-sensing-based watermark cryptosystem and circuits implementation for wireless sensor networks. EEE Trans Very Large Scale Integr Syst 27(11):2485–2497
Cheraghchi M, Indyk P (2017) Nearly optimal deterministic algorithm for sparse Walsh-Hadamard transform. ACM Trans Algorithms 13(3):1–36
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854
Dadkhah S, Abd Manaf A, Hori Y, Hassanien AE, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210
Dong J, Wang W, Tan T (2013). Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, pp 422–426
Faragallah OS (2018) Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wireless Pers Commun 98(2):2009–2023
Farid, H. (1999). Detecting digital forgeries using bispectral analysis.
Farid H (2017) How to detect faked photos. Am Sci 3
Haghighi BB, Taherinia AH, Mohajerzadeh AH (2019) TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf Sci 486:204–230
Hsu CS, Tu SF (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296
Hsu YF, Chang SF (2010) Camera response functions for image forensics: an automatic algorithm for splicing detection. IEEE Trans Inf Forensics Secur 5(4):816–825
Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digit Ecosyst 2(1–2):1–12
Liu Y, Xiang L, Yang LL, Hanzo L (2021) Space-time coded generalized spatial modulation for sparse code division multiple access. IEEE Trans Wirel Commun
Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher order statistics. In: 2004 IEEE international symposium on circuits and systems (IEEE Cat. No. 04CH37512), vol 5. IEEE, pp V-V
Nguyen AH, Pickering MR, Lambert A (2016) The FPGA implementation of a one-bit-per-pixel image registration algorithm. J Real-Time Image Proc 11(4):799–815
Park TH, Han JG, Moon YH, Eom IK (2016) Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain. EURASIP J Image Video Process 2016(1):1–10
Park CS, Kim C, Lee J, Kwon GR (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimed Tools Appl 75(23):16577–16595
Park CS, Choeh JY (2018) Fast and robust copy-move forgery detection based on scale-space representation. Multimed Tools Appl 77(13):16795–16811
Pham NT, Lee JW, Kwon GR, Park CS (2019) Hybrid image-retrieval method for image-splicing validation. Symmetry 11(1):83
Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3):1673–1705
Prucnal PR (Ed) (2018) Optical code division multiple access: fundamentals and applications. CRC press
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6
Robles A, Norris J, Watson S, Browne AF (2018) Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits. In: SoutheastCon 2018. IEEE, pp 1–5
Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron Commun 72:149–161
Roy D, Sengupta A (2017) Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesis. Futur Gener Comput Syst 71:89–101
Sara U, Akter M, Uddin MS (2019) Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study. J Comput Commun 7(3):8–18
Sharma S, Zou JJ, Fang G (2020) A novel signature watermarking scheme for identity protection. In: 2020 Digital Image Computing: Techniques and Applications (DICTA). IEEE, pp 1–5
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278
Singh RK, Shaw DK, Alam MJ (2015) Experimental studies of LSB watermarking with different noise. Procedia Comput Sci 54:612–620
Singhal S, Ranga V (2021) Passive authentication image forgery detection using multilayer cnn. In: Mobile Radio Communications and 5G Networks. Springer, Singapore, pp 237–249
Sun XC, Lu ZM, Wang Z, Liu YL (2021) A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT. Multimed Tools Appl 80(9):13491–13511
Teng L, Wang X, Wang X (2013) Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int J Electron Commun 67(6):540–547
Ulutas G, Ustubioglu A, Ustubioglu B, Nabiyev VV, Ulutas M (2017) Medical image tamper detection based on passive image authentication. J Digit Imaging 30(6):695–709
Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: Towards a second generation watermarking benchmark. Signal Process 81(6):1177–1214
Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), vol 1). IEEE, pp 455–459.
Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458
Zhang H, Wang C, Zhou X (2017) Fragile watermarking based on LBP for blind tamper detection in images. J Inf Process Syst 13(2):385–399
Zheng Y, Cao Y, Chang CH (2019) A PUF-based data-device hash for tampered image detection and source camera identification. IEEE Trans Inf Forensics Secur 15:620–634
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The author certifies that he has NO affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers’ bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non-financial interest (such as personal or professional relationships, affiliations, knowledge or beliefs) in the subject matter or materials discussed in this manuscript.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
AlShaikh, M. A novel tamper detection watermarking approach for improving image integrity. Multimed Tools Appl 82, 10039–10060 (2023). https://doi.org/10.1007/s11042-021-11840-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11840-w