Abstract
In this work, an active forgery detection scheme is proposed to locate the tampered region from a forged digital image. In this regard, an authentication code is formed and subsequently, the same is concealed into each pixel for the realization of a fragile watermarked image. In an active forgery detection procedure, the extracted authentication code from the fragile watermarked image is considered to detect the tampered region properly. The main goal of this work is to generate a secure authentication code for preventing the attackers from purposely altering the embedded code to match the tampered image contents as well as to cause less visual distortion after the construction of the fragile watermarked image. Initially, the authentication code for each pixel is computed using Hamming code from the first four most significant bits (MSBs) and subsequently, the same is considered to conceal into some least significant bits (LSBs) of that particular pixel. Generally, the LSB components are found visually insignificant so, the suggested pixel-level authentication code embedding procedure retains the high visual quality of the watermarked image. The proposed fragile watermarking is secured since the authentication code embedding procedure is realized using the logistic-map based generated secret parameters. The proposed scheme has been implemented and the results based on the input of several grayscale images are found satisfactory. In addition, several tampered images are considered to validate the proficiency of tampering detection of the proposed work. The obtained results demonstrate that the presented work is effectively capable to detect the tampered region even in pixel-level from the forged digital image content and also the results are found comparable to some related works.
Similar content being viewed by others
References
Al Sharif S, Al Ali M, Al Reqabi N, Iqbal F, Baker T, Marrington A (2016) Magec: an image searching tool for detecting forged images in forensic investigation, in 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1-6. IEEE
Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1-6. IEEE
Ansari I-A, Pant M, Ahn C-W (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Bravo-Solorio S, Calderon F, Li C-T, Nandi A-K (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit Signal Process 73:83–93
Chang Y-F, Tail W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electron Rev 21(2):182–190
Chang C-C, Chen K-N,Lee C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 2011; 84(9): 1462–1470.
Hamdi D, Iqbal F, Baker T, Shah B(2016) Multimedia file signature analysis for smartphone forensics, in 2016 9th international conference on developments in eSystems engineering (DeSE), pp. 130-137. IEEE
He H, Zhang J, Chen F(2007) Block-wise fragile watermarking scheme based on scramble encryption. Second International Conference on Bio-Inspired Computing: Theories and Applications
Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743
Lee Y-K, Chang J-C, Wu H-L, Chen R-J (2012) An efficient fragile watermarking scheme for pixel-wise tamper detection. Sixth international conference on genetic and evolutionary computing, pp 149-152
Martino F-D, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195(15):62–90
Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based onchaotic maps. Multimed Tools Appl 76(15):16107–16123
Peng Y, Niu X, Fu L, Yin Z (2018) Image authentication scheme based on reversible fragile watermarking with two images. J Inf Secur Appl 40:236–246
Prasad S, Pal AK (2019) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 78(22):1–33
Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–229
Solorio S-B, Nandi A-K (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739
Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self –recovery. J Vis Commun Image Represent 49:164–176
Suthaharan S (2010) Logistic map-based fragile watermarking for pixel level tamper detection and resistance. EURASIP J Inf Secur 2010:7 (2010)
Tai W-L, Liao Z-J (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11–25
Thar B, Asim M, MacDermott Á, Iqbal F, Kamoun F, Shah B, Alfandi O, Hammoudeh M (2019) A secure fog-based platform for SCADA-based IoT critical infrastructure, Software: Practice and Experience, pp 1–16
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28:301–308
Trivedy S, Pal A-K (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41(2):1–11
Xiao D, Shih F-Y (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post- processing. Opt Commun 285(10–11):2596–2606
Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89:675–679
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Prasad, S., Pal, A.K. Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79, 20897–20928 (2020). https://doi.org/10.1007/s11042-020-08715-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08715-x