Skip to main content
Log in

Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this work, an active forgery detection scheme is proposed to locate the tampered region from a forged digital image. In this regard, an authentication code is formed and subsequently, the same is concealed into each pixel for the realization of a fragile watermarked image. In an active forgery detection procedure, the extracted authentication code from the fragile watermarked image is considered to detect the tampered region properly. The main goal of this work is to generate a secure authentication code for preventing the attackers from purposely altering the embedded code to match the tampered image contents as well as to cause less visual distortion after the construction of the fragile watermarked image. Initially, the authentication code for each pixel is computed using Hamming code from the first four most significant bits (MSBs) and subsequently, the same is considered to conceal into some least significant bits (LSBs) of that particular pixel. Generally, the LSB components are found visually insignificant so, the suggested pixel-level authentication code embedding procedure retains the high visual quality of the watermarked image. The proposed fragile watermarking is secured since the authentication code embedding procedure is realized using the logistic-map based generated secret parameters. The proposed scheme has been implemented and the results based on the input of several grayscale images are found satisfactory. In addition, several tampered images are considered to validate the proficiency of tampering detection of the proposed work. The obtained results demonstrate that the presented work is effectively capable to detect the tampered region even in pixel-level from the forged digital image content and also the results are found comparable to some related works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

References

  1. Al Sharif S, Al Ali M, Al Reqabi N, Iqbal F, Baker T, Marrington A (2016) Magec: an image searching tool for detecting forged images in forensic investigation, in 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1-6. IEEE

  2. Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1-6. IEEE

  3. Ansari I-A, Pant M, Ahn C-W (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  4. Bravo-Solorio S, Calderon F, Li C-T, Nandi A-K (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit Signal Process 73:83–93

    Article  MathSciNet  Google Scholar 

  5. Chang Y-F, Tail W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electron Rev 21(2):182–190

    Article  Google Scholar 

  6. Chang C-C, Chen K-N,Lee C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 2011; 84(9): 1462–1470.

  7. Hamdi D, Iqbal F, Baker T, Shah B(2016) Multimedia file signature analysis for smartphone forensics, in 2016 9th international conference on developments in eSystems engineering (DeSE), pp. 130-137. IEEE

  8. He H, Zhang J, Chen F(2007) Block-wise fragile watermarking scheme based on scramble encryption. Second International Conference on Bio-Inspired Computing: Theories and Applications

  9. Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743

    Article  Google Scholar 

  10. Lee Y-K, Chang J-C, Wu H-L, Chen R-J (2012) An efficient fragile watermarking scheme for pixel-wise tamper detection. Sixth international conference on genetic and evolutionary computing, pp 149-152

  11. Martino F-D, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195(15):62–90

    Article  Google Scholar 

  12. Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based onchaotic maps. Multimed Tools Appl 76(15):16107–16123

    Article  Google Scholar 

  13. Peng Y, Niu X, Fu L, Yin Z (2018) Image authentication scheme based on reversible fragile watermarking with two images. J Inf Secur Appl 40:236–246

    Google Scholar 

  14. Prasad S, Pal AK (2019) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 78(22):1–33

    Google Scholar 

  15. Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287

    Article  Google Scholar 

  16. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–229

    Article  Google Scholar 

  17. Solorio S-B, Nandi A-K (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739

    Article  Google Scholar 

  18. Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self –recovery. J Vis Commun Image Represent 49:164–176

    Article  Google Scholar 

  19. Suthaharan S (2010) Logistic map-based fragile watermarking for pixel level tamper detection and resistance. EURASIP J Inf Secur 2010:7 (2010)

    Google Scholar 

  20. Tai W-L, Liao Z-J (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11–25

    Article  Google Scholar 

  21. Thar B, Asim M, MacDermott Á, Iqbal F, Kamoun F, Shah B, Alfandi O, Hammoudeh M (2019) A secure fog-based platform for SCADA-based IoT critical infrastructure, Software: Practice and Experience, pp 1–16

  22. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28:301–308

    Article  Google Scholar 

  23. Trivedy S, Pal A-K (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41(2):1–11

    Article  Google Scholar 

  24. Xiao D, Shih F-Y (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post- processing. Opt Commun 285(10–11):2596–2606

    Article  Google Scholar 

  25. Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89:675–679

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiv Prasad.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prasad, S., Pal, A.K. Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79, 20897–20928 (2020). https://doi.org/10.1007/s11042-020-08715-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08715-x

Keywords

Navigation