Skip to main content
Log in

A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Intentional illegitimate modification in any digital image data is one of the general malversations in the existing digital domain. Therefore in this work, the authors have devised a fragile watermarking technique for the localization of illegitimate modifications in the digital image content effectually. The proposed technique detects forged digital image content strongly in the block-level of two successive pixels. This scheme is performed at the block level, where the actual image is partitioned into non-overlapping blocks of size (1 × 2) pixels. Afterward, the block-level authentication code is generated from the MSB of two successive pixels of each block using averaging and modulus operations. The generated authentication code/watermark is encrypted using a logistic-map-based chaotic key series. The encrypted authentication code is embedded into two successive pixels of the corresponding block. Further, any form of forgery in the watermarked image can be detected by comparing its extracted authentication code and regenerated authentication code. The proposed procedure is successfully experienced on a variety of grayscale images, and the experimental results exhibit that watermarked images generated by this scheme are of considerably high quality in terms of PSNR, IF, and SSIM. The proposed method is capable of efficient forgery detection by achieving very high accuracy, NC, and true positive rate while maintaining considerably low false-positive and false-negative rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30

Similar content being viewed by others

Data Availability

The data and material used to support the findings of this study are included within the article.

Code Availability

The pseudo code of the proposed work is included within the article.

References

  1. Sencar, H., & Memon, N. (2014). Digital image forensics: There is more to a picture than meets the eye. Springer. https://doi.org/10.1007/978-1-4614-0757-7

    Book  Google Scholar 

  2. Lu, C. S. (2005). Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Idea Group Publishing. https://doi.org/10.4018/978-1-59140-192-6

    Article  Google Scholar 

  3. He, H., Zhang, J., & Chen, F. (2007). Block-wise fragile watermarking scheme based on scramble encryption. In Second international conference on bio-inspired computing: Theories and applications. https://doi.org/10.1109/BICTA.2007.4806454.

  4. Qin, C., Ji, P., Zhang, X., Dong, J., & Wang, J. (2017). Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Processing, 138, 280–293. https://doi.org/10.1016/j.sigpro.2017.03.033

    Article  Google Scholar 

  5. Zhang, X., & Wang, S. (2009). Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, 89, 675–679. https://doi.org/10.1016/j.sigpro.2008.10.001

    Article  MATH  Google Scholar 

  6. Piper, A., & Safavi-Naini, R. (2013). Scalable fragile watermarking for image authentication. IET Information Security, 7(4), 300–311. https://doi.org/10.1049/iet-ifs.2010.0059

    Article  Google Scholar 

  7. Chang, C. C., Chen, K. N., Lee, C. F., & Liu, L. J. (2011). A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software, 84(9), 1462–1470. https://doi.org/10.1016/j.jss.2011.02.029

    Article  Google Scholar 

  8. Solorio, S. B., & Nandi, A. K. (2011). Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Processing, 91(4), 728–739. https://doi.org/10.1016/j.sigpro.2010.07.019

    Article  MATH  Google Scholar 

  9. Tong, X., Liu, Y., Zhang, M., & Chen, Y. (2013). A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication, 8(3), 301–308. https://doi.org/10.1016/j.image.2012.12.003

    Article  Google Scholar 

  10. Prasad, S., & Pal, A. K. (2019). A secure fragile watermarking scheme for protecting integrity of digital images. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 43(4), 1–25. https://doi.org/10.1007/s40998-019-00275-7

    Article  Google Scholar 

  11. Hsu, C.-S., & Tu, S.-F. (2010). Probability-based tampering detection scheme for digital images. Optics Communications, 283, 1737–1743. https://doi.org/10.1016/j.optcom.2009.12.073

    Article  Google Scholar 

  12. Sreenivas, K., & Kamakshiprasad, V. (2017). Improved image tamper localisation using chaotic maps and self-recovery. Journal of Visual Communication and Image Representation, 49, 164–176. https://doi.org/10.1016/j.jvcir.2017.09.001

    Article  Google Scholar 

  13. Trivedy, S., & Pal, A. K. (2017). A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 41(2), 1–11. https://doi.org/10.1007/s40998-017-0021-9

    Article  Google Scholar 

  14. Rawat, S., & Raman, B. (2011). A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU), 65, 840–847. https://doi.org/10.1016/j.aeue.2011.01.016

    Article  Google Scholar 

  15. Nazari, M., & Sharif, S. (2017). An improved method for digital image fragile watermarking based on chaotic maps. Multimedia Tools and Applications, 76(15), 16107–16123.

    Article  Google Scholar 

  16. Prasad, S., & Pal, A. K. (2020). A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimedia Tools and Applications, 79(2020), 1673–1705. https://doi.org/10.1007/s11042-019-08144-5

    Article  Google Scholar 

  17. Chang, Y. F., & Tai, W. L. (2013). A block-based watermarking scheme for image tamper detection and self-recovery. Opto Electronics Review, 21(2), 182–190. https://doi.org/10.2478/s11772-013-0088-4

    Article  MathSciNet  Google Scholar 

  18. Prasad, S., & Pal, A. K. (2019). Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement. Emerging technologies in data mining and information security. Advances in Intelligent Systems and Computing, 814, 203–214. https://doi.org/10.1007/978-981-13-1501-5_17

    Article  Google Scholar 

  19. Thien, C.-C., & Lin, J. C. (2003). A simple and high-hiding capacity method for hiding digit-by-digit in images based on modulus function. Pattern Recognition, 36, 2875–2881. https://doi.org/10.1016/S0031-3203(03)00221-8

    Article  MATH  Google Scholar 

  20. Tanchenko, A. (2014). Visual-psnr measure of image quality. Journal of Visual Communication and Image Representation, 25(5), 874–878. https://doi.org/10.1016/j.jvcir.2014.01.008

    Article  Google Scholar 

  21. Tong, M., Pan, Y., Li, Z., & Lin, W. (2018). Valid data based normalized cross-correlation (VDNCC) for topography identification. Neurocomputing, 308, 184–193. https://doi.org/10.1016/j.neucom.2018.04.059

    Article  Google Scholar 

  22. Soualmi, A., Alti, A., & Laouamer, L. (2022). An imperceptible watermarking scheme for medical image tamper detection. International Journal of Information Security and Privacy, 16(1), 1–18. https://doi.org/10.4018/IJISP.2022010102

    Article  Google Scholar 

Download references

Funding

There is no funding for this publication.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiv Prasad.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prasad, S., Pal, A.K. & Paul, S. A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wireless Pers Commun 125, 2581–2619 (2022). https://doi.org/10.1007/s11277-022-09675-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09675-1

Keywords

Navigation