Skip to main content
Log in

Approximate regeneration of image using fragile watermarking for tamper detection and recovery in real time

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital Image Watermarking has been rigorously used for image authenticity problems. Fragile watermarking is sensitive to even slight modifications and can detect tampering. This paper proposes a real-time tamper detection algorithm and regenerates an approximate image for the tampered locations. The image is divided into 4 parts and pair-wise correspondence is formed. This correspondence is used for marking the authenticity of parts of images and helps in the reconstruction of tampered parts. For every part, sub-blocks of size 4 × 4 are formed. Upon calculating the average of 4 inner pixels of these 4 × 4 blocks, a Local Binary Pattern (LBP) is constructed for that sub-block. Using XOR operation on 12-bit LBP, a 6-bit watermark for that sub-block is generated. This watermark is used for block authentication. Next, for recovery information, the 4 × 4 sub-block is divided into four 2 × 2 parts, and their average is calculated. This information is used for the recovery of tampered regions in the image. The watermark along with the average is then embedded into the corresponding sub-block in the pair-wise section of the image. This helps ensure the authenticity of the sub-block and helps in storing information needed for regeneration in case a part of the watermarked image has been tampered with. The imperceptibility and extent of degradation of the original image upon embedding the watermarking bits are calculated using the peak signal-to-noise ratio and structural similarity index. The approach is tested against a variety of attacks and shows its applicability in real-time applications with quick approximate reconstruction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The test images used in the manuscript are standard watermarking images found at sipi.usc.edu.

Further, no new custom algorithms have been created for this work.

Abbreviations

LBP :

Local Binary pattern

XOR :

Exclusive OR

ROI :

Region of interest

RONI :

Region of non-interest

DCT :

Discrete cosine transform

VQ :

Vector quantization

RGB :

Red green blue

PSNR :

Peak signal-to-noise ratio

SSI :

Structural similarity index

MSE :

Mean-squared error

NC :

Normalized correlation

SOTA :

State-of-the-art

References

  1. Haouzia A, Noumeir R (2008) Methods for image authentication : a survey. Multimed Tools Appl 39:1–46. https://doi.org/10.1007/s11042-007-0154-3

    Article  Google Scholar 

  2. Anand A, Singh AK (2021) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80:30165–30197

    Article  Google Scholar 

  3. Kumar S, Kumar B, Mohit S (2020) A Recent Survey on Multimedia and Database Watermarking. Multimed Tools Appl 79:20149–20197

    Article  Google Scholar 

  4. Tao H, Zain JM, Ahmed MM, Abdalla AN, Jing W (2012) A wavelet-based particle swarm optimization algorithm for digital image watermarking. Integr Comput Aided Eng 19(1):81–91. https://doi.org/10.3233/ICA-2012-0392

    Article  Google Scholar 

  5. Sisaudia V, Vishwakarma VP (2021) Tamper detection using self-generating watermarks based on local binary patterns. International conference on smart generation computing, communication and networking (SMART GENCON), Pune: IEEE, pp. 1–6. https://doi.org/10.1109/SMARTGENCON51891.2021.9645894

  6. Shih FY, Zhong X, Chang I (2017) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed Tools Appl 77:1623–1642. https://doi.org/10.1007/s11042-017-4367-9

    Article  Google Scholar 

  7. Belferdi W, Behloul A, Noui L (2019) A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimens Syst Signal Process 30:1093–1112. https://doi.org/10.1007/s11045-018-0597-x

    Article  MathSciNet  Google Scholar 

  8. Balasamy K (2019) An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22:4431–4442. https://doi.org/10.1007/s10586-018-1991-8

    Article  Google Scholar 

  9. Evsutin O, Dzhanashia K (2022) Watermarking schemes for digital images: Robustness overview. Signal Process Image Commun 100:116523. https://doi.org/10.1016/j.image.2021.116523

    Article  Google Scholar 

  10. Savakar DG, Ghuli A (2019) Robust Invisible Digital Image Watermarking Using Hybrid Scheme. Arab J Sci Eng 44(4):3995–4008. https://doi.org/10.1007/s13369-019-03751-8

    Article  Google Scholar 

  11. Prasad KSVK (2018) Fragile watermarking schemes for image authentication : a survey. Int J Mach Learn Cybern 9(7):1193–1218. https://doi.org/10.1007/s13042-017-0641-4

    Article  Google Scholar 

  12. Di Martino F, Sessa S (2019) Fragile watermarking tamper detection via bilinear fuzzy relation equations. J Ambient Intell Humanized Comput 10:2041–2061

    Article  Google Scholar 

  13. Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 73:17701–17718

    Article  Google Scholar 

  14. Gul E, Ozturk S (2021) A novel pixel-wise authentication-based self-embedding fragile watermarking method. Multimed Syst 27(3):531–545

    Article  Google Scholar 

  15. Yuan Z, Su Q, Liu D, Zhang X (2021) A blind image watermarking scheme combining spatial domain and frequency domain. Vis Comput 37(7):1867–1881. https://doi.org/10.1007/s00371-020-01945-y

    Article  Google Scholar 

  16. Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491. https://doi.org/10.1016/j.sigpro.2011.12.006

    Article  Google Scholar 

  17. Mishra A, Rajpal A, Bala R (2018) Journal of Information Security and Applications Bi-directional extreme learning machine for semi-blind watermarking of compressed images. J Inf Secur Appl 38:71–84. https://doi.org/10.1016/j.jisa.2017.11.008

    Article  Google Scholar 

  18. Rajpal A, Mishra A, Bala R (2016) Multiple scaling factors based Semi-Blind watermarking of grayscale images using OS-ELM neural network, ICSPCC 2016 - IEEE International conference on signal processing, communications and computing, conference proceedings, Hong Kong, China, pp. 1-6. https://doi.org/10.1109/ICSPCC.2016.7753622

  19. Dharwadkar NV, Amberker BB, Gorai A (2011) Non-blind watermarking scheme for color images in RGB space using DWT-SVD. In 2011 International conference on communications and signal processing, IEEE, pp. 489–493. https://doi.org/10.1109/ICCSP.2011.5739368

  20. Rakhmawati L, Suwadi S, Wirawan W (2020) Blind robust and self-embedding fragile image watermarking for image authentication and copyright protection with recovery capability. Int J Intell Eng Syst 13(5):197–210

    Google Scholar 

  21. Rahman AU, Sultan K, Musleh D, Aldhafferi N, Alqahtani A, Mahmud M (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthcare Eng. https://doi.org/10.1155/2018/8137436

  22. Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287. https://doi.org/10.1007/s11042-015-3218-9

    Article  Google Scholar 

  23. Lin CC, He SL, Chang CC (2021) Pixel-based fragile image watermarking based on absolute moment block truncation coding. Multimed Tools Appl 80(19):29497–29518. https://doi.org/10.1007/s11042-021-10598-5

    Article  Google Scholar 

  24. Ramos AM, Artiles JAP, Chaves DPB, Pimentel C (2023) A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes. Entropy 25(3):508. https://doi.org/10.3390/e25030508

    Article  Google Scholar 

  25. Singh D, Singh SK, Udmale SS (2023) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability. Multimed Tools Appl 82(1):1045–1066. https://doi.org/10.1007/s11042-022-13270-8

    Article  Google Scholar 

  26. Prasad S, Pal AK, Paul S (2022) A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wirel Pers Commun 125(3):2581–2619. https://doi.org/10.1007/s11277-022-09675-1

    Article  Google Scholar 

  27. Renklier A, Öztürk S (2023) Image authentication and recovery: sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15999-2

  28. Sivasubramanian N, Konganathan G (2020) A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 102(6):1365–1384. https://doi.org/10.1007/s00607-020-00797-7

    Article  MathSciNet  Google Scholar 

  29. Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern. Signal Image Video Process 11(1):81–88. https://doi.org/10.1007/s11760-016-0899-0

    Article  Google Scholar 

  30. Singh D, Singh SK (2015) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76:953–977. https://doi.org/10.1007/s11042-015-3010-x

    Article  Google Scholar 

  31. Ouyang J, Huang J, Wen X (2023) A semi-fragile reversible watermarking method based on qdft and tamper ranking, Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16963-w

  32. Ouyang J, Huang J, Wen X, Shao Z (2023) A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion. Multimed Tools Appl 82(10):15113–15141. https://doi.org/10.1007/s11042-022-13938-1

    Article  Google Scholar 

  33. Wu HC, Fan WL, Tsai CS, Ying JJC (2022) An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multimed Tools Appl 81(14):19351–19375. https://doi.org/10.1007/s11042-021-11018-4

    Article  Google Scholar 

  34. Azizoglu G, Toprak AN (2023) A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication. Biomed Signal Process Control 84:105015. https://doi.org/10.1016/j.bspc.2023.105015

    Article  Google Scholar 

  35. Srivastava V, Yadav SK (2022) Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor. J Appl Secur Res 17(1):62–79. https://doi.org/10.1080/19361610.2021.1883397

    Article  Google Scholar 

  36. Pal P, Jana B, Bhaumik J (2021) An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error. Wirel Pers Commun 121(1):939–961. https://doi.org/10.1007/s11277-021-08666-y

    Article  Google Scholar 

  37. Park JY, Kang TA, Moon YH, Eom IK (2020) Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry (Basel) 12(4):492

    Article  Google Scholar 

  38. Kalsi DK, Rai P (2017) A Copy-move forgery detection system using approximation image local binary pattern. In 2017 International conference on recent innovations in signal processing and embedded systems (RISE), IEEE. pp. 284–288. https://doi.org/10.1109/RISE.2017.8378168

  39. Bhalerao S, Ahmad I, Anil A (2021) A secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12(1):1057–1068. https://doi.org/10.1007/s12652-020-02135-3

    Article  Google Scholar 

  40. Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3–4):1673–1705

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Varsha Sisaudia.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sisaudia, V., Vishwakarma, V.P. Approximate regeneration of image using fragile watermarking for tamper detection and recovery in real time. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18247-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18247-3

Keywords

Navigation