Abstract
Digital Image Watermarking has been rigorously used for image authenticity problems. Fragile watermarking is sensitive to even slight modifications and can detect tampering. This paper proposes a real-time tamper detection algorithm and regenerates an approximate image for the tampered locations. The image is divided into 4 parts and pair-wise correspondence is formed. This correspondence is used for marking the authenticity of parts of images and helps in the reconstruction of tampered parts. For every part, sub-blocks of size 4 × 4 are formed. Upon calculating the average of 4 inner pixels of these 4 × 4 blocks, a Local Binary Pattern (LBP) is constructed for that sub-block. Using XOR operation on 12-bit LBP, a 6-bit watermark for that sub-block is generated. This watermark is used for block authentication. Next, for recovery information, the 4 × 4 sub-block is divided into four 2 × 2 parts, and their average is calculated. This information is used for the recovery of tampered regions in the image. The watermark along with the average is then embedded into the corresponding sub-block in the pair-wise section of the image. This helps ensure the authenticity of the sub-block and helps in storing information needed for regeneration in case a part of the watermarked image has been tampered with. The imperceptibility and extent of degradation of the original image upon embedding the watermarking bits are calculated using the peak signal-to-noise ratio and structural similarity index. The approach is tested against a variety of attacks and shows its applicability in real-time applications with quick approximate reconstruction.
Similar content being viewed by others
Data availability
The test images used in the manuscript are standard watermarking images found at sipi.usc.edu.
Further, no new custom algorithms have been created for this work.
Abbreviations
- LBP :
-
Local Binary pattern
- XOR :
-
Exclusive OR
- ROI :
-
Region of interest
- RONI :
-
Region of non-interest
- DCT :
-
Discrete cosine transform
- VQ :
-
Vector quantization
- RGB :
-
Red green blue
- PSNR :
-
Peak signal-to-noise ratio
- SSI :
-
Structural similarity index
- MSE :
-
Mean-squared error
- NC :
-
Normalized correlation
- SOTA :
-
State-of-the-art
References
Haouzia A, Noumeir R (2008) Methods for image authentication : a survey. Multimed Tools Appl 39:1–46. https://doi.org/10.1007/s11042-007-0154-3
Anand A, Singh AK (2021) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80:30165–30197
Kumar S, Kumar B, Mohit S (2020) A Recent Survey on Multimedia and Database Watermarking. Multimed Tools Appl 79:20149–20197
Tao H, Zain JM, Ahmed MM, Abdalla AN, Jing W (2012) A wavelet-based particle swarm optimization algorithm for digital image watermarking. Integr Comput Aided Eng 19(1):81–91. https://doi.org/10.3233/ICA-2012-0392
Sisaudia V, Vishwakarma VP (2021) Tamper detection using self-generating watermarks based on local binary patterns. International conference on smart generation computing, communication and networking (SMART GENCON), Pune: IEEE, pp. 1–6. https://doi.org/10.1109/SMARTGENCON51891.2021.9645894
Shih FY, Zhong X, Chang I (2017) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed Tools Appl 77:1623–1642. https://doi.org/10.1007/s11042-017-4367-9
Belferdi W, Behloul A, Noui L (2019) A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimens Syst Signal Process 30:1093–1112. https://doi.org/10.1007/s11045-018-0597-x
Balasamy K (2019) An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22:4431–4442. https://doi.org/10.1007/s10586-018-1991-8
Evsutin O, Dzhanashia K (2022) Watermarking schemes for digital images: Robustness overview. Signal Process Image Commun 100:116523. https://doi.org/10.1016/j.image.2021.116523
Savakar DG, Ghuli A (2019) Robust Invisible Digital Image Watermarking Using Hybrid Scheme. Arab J Sci Eng 44(4):3995–4008. https://doi.org/10.1007/s13369-019-03751-8
Prasad KSVK (2018) Fragile watermarking schemes for image authentication : a survey. Int J Mach Learn Cybern 9(7):1193–1218. https://doi.org/10.1007/s13042-017-0641-4
Di Martino F, Sessa S (2019) Fragile watermarking tamper detection via bilinear fuzzy relation equations. J Ambient Intell Humanized Comput 10:2041–2061
Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl 73:17701–17718
Gul E, Ozturk S (2021) A novel pixel-wise authentication-based self-embedding fragile watermarking method. Multimed Syst 27(3):531–545
Yuan Z, Su Q, Liu D, Zhang X (2021) A blind image watermarking scheme combining spatial domain and frequency domain. Vis Comput 37(7):1867–1881. https://doi.org/10.1007/s00371-020-01945-y
Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491. https://doi.org/10.1016/j.sigpro.2011.12.006
Mishra A, Rajpal A, Bala R (2018) Journal of Information Security and Applications Bi-directional extreme learning machine for semi-blind watermarking of compressed images. J Inf Secur Appl 38:71–84. https://doi.org/10.1016/j.jisa.2017.11.008
Rajpal A, Mishra A, Bala R (2016) Multiple scaling factors based Semi-Blind watermarking of grayscale images using OS-ELM neural network, ICSPCC 2016 - IEEE International conference on signal processing, communications and computing, conference proceedings, Hong Kong, China, pp. 1-6. https://doi.org/10.1109/ICSPCC.2016.7753622
Dharwadkar NV, Amberker BB, Gorai A (2011) Non-blind watermarking scheme for color images in RGB space using DWT-SVD. In 2011 International conference on communications and signal processing, IEEE, pp. 489–493. https://doi.org/10.1109/ICCSP.2011.5739368
Rakhmawati L, Suwadi S, Wirawan W (2020) Blind robust and self-embedding fragile image watermarking for image authentication and copyright protection with recovery capability. Int J Intell Eng Syst 13(5):197–210
Rahman AU, Sultan K, Musleh D, Aldhafferi N, Alqahtani A, Mahmud M (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthcare Eng. https://doi.org/10.1155/2018/8137436
Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287. https://doi.org/10.1007/s11042-015-3218-9
Lin CC, He SL, Chang CC (2021) Pixel-based fragile image watermarking based on absolute moment block truncation coding. Multimed Tools Appl 80(19):29497–29518. https://doi.org/10.1007/s11042-021-10598-5
Ramos AM, Artiles JAP, Chaves DPB, Pimentel C (2023) A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes. Entropy 25(3):508. https://doi.org/10.3390/e25030508
Singh D, Singh SK, Udmale SS (2023) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability. Multimed Tools Appl 82(1):1045–1066. https://doi.org/10.1007/s11042-022-13270-8
Prasad S, Pal AK, Paul S (2022) A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wirel Pers Commun 125(3):2581–2619. https://doi.org/10.1007/s11277-022-09675-1
Renklier A, Öztürk S (2023) Image authentication and recovery: sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15999-2
Sivasubramanian N, Konganathan G (2020) A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 102(6):1365–1384. https://doi.org/10.1007/s00607-020-00797-7
Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern. Signal Image Video Process 11(1):81–88. https://doi.org/10.1007/s11760-016-0899-0
Singh D, Singh SK (2015) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76:953–977. https://doi.org/10.1007/s11042-015-3010-x
Ouyang J, Huang J, Wen X (2023) A semi-fragile reversible watermarking method based on qdft and tamper ranking, Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16963-w
Ouyang J, Huang J, Wen X, Shao Z (2023) A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion. Multimed Tools Appl 82(10):15113–15141. https://doi.org/10.1007/s11042-022-13938-1
Wu HC, Fan WL, Tsai CS, Ying JJC (2022) An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multimed Tools Appl 81(14):19351–19375. https://doi.org/10.1007/s11042-021-11018-4
Azizoglu G, Toprak AN (2023) A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication. Biomed Signal Process Control 84:105015. https://doi.org/10.1016/j.bspc.2023.105015
Srivastava V, Yadav SK (2022) Digital Image Tampering Detection Using Multilevel Local Binary Pattern Texture Descriptor. J Appl Secur Res 17(1):62–79. https://doi.org/10.1080/19361610.2021.1883397
Pal P, Jana B, Bhaumik J (2021) An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error. Wirel Pers Commun 121(1):939–961. https://doi.org/10.1007/s11277-021-08666-y
Park JY, Kang TA, Moon YH, Eom IK (2020) Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry (Basel) 12(4):492
Kalsi DK, Rai P (2017) A Copy-move forgery detection system using approximation image local binary pattern. In 2017 International conference on recent innovations in signal processing and embedded systems (RISE), IEEE. pp. 284–288. https://doi.org/10.1109/RISE.2017.8378168
Bhalerao S, Ahmad I, Anil A (2021) A secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12(1):1057–1068. https://doi.org/10.1007/s12652-020-02135-3
Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3–4):1673–1705
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sisaudia, V., Vishwakarma, V.P. Approximate regeneration of image using fragile watermarking for tamper detection and recovery in real time. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18247-3
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18247-3