Abstract
Intentional illegitimate modification in any digital image data is one of the general malversations in the existing digital domain. Therefore in this work, the authors have devised a fragile watermarking technique for the localization of illegitimate modifications in the digital image content effectually. The proposed technique detects forged digital image content strongly in the block-level of two successive pixels. This scheme is performed at the block level, where the actual image is partitioned into non-overlapping blocks of size (1 × 2) pixels. Afterward, the block-level authentication code is generated from the MSB of two successive pixels of each block using averaging and modulus operations. The generated authentication code/watermark is encrypted using a logistic-map-based chaotic key series. The encrypted authentication code is embedded into two successive pixels of the corresponding block. Further, any form of forgery in the watermarked image can be detected by comparing its extracted authentication code and regenerated authentication code. The proposed procedure is successfully experienced on a variety of grayscale images, and the experimental results exhibit that watermarked images generated by this scheme are of considerably high quality in terms of PSNR, IF, and SSIM. The proposed method is capable of efficient forgery detection by achieving very high accuracy, NC, and true positive rate while maintaining considerably low false-positive and false-negative rates.
Similar content being viewed by others
Data Availability
The data and material used to support the findings of this study are included within the article.
Code Availability
The pseudo code of the proposed work is included within the article.
References
Sencar, H., & Memon, N. (2014). Digital image forensics: There is more to a picture than meets the eye. Springer. https://doi.org/10.1007/978-1-4614-0757-7
Lu, C. S. (2005). Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Idea Group Publishing. https://doi.org/10.4018/978-1-59140-192-6
He, H., Zhang, J., & Chen, F. (2007). Block-wise fragile watermarking scheme based on scramble encryption. In Second international conference on bio-inspired computing: Theories and applications. https://doi.org/10.1109/BICTA.2007.4806454.
Qin, C., Ji, P., Zhang, X., Dong, J., & Wang, J. (2017). Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Processing, 138, 280–293. https://doi.org/10.1016/j.sigpro.2017.03.033
Zhang, X., & Wang, S. (2009). Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, 89, 675–679. https://doi.org/10.1016/j.sigpro.2008.10.001
Piper, A., & Safavi-Naini, R. (2013). Scalable fragile watermarking for image authentication. IET Information Security, 7(4), 300–311. https://doi.org/10.1049/iet-ifs.2010.0059
Chang, C. C., Chen, K. N., Lee, C. F., & Liu, L. J. (2011). A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software, 84(9), 1462–1470. https://doi.org/10.1016/j.jss.2011.02.029
Solorio, S. B., & Nandi, A. K. (2011). Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Processing, 91(4), 728–739. https://doi.org/10.1016/j.sigpro.2010.07.019
Tong, X., Liu, Y., Zhang, M., & Chen, Y. (2013). A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication, 8(3), 301–308. https://doi.org/10.1016/j.image.2012.12.003
Prasad, S., & Pal, A. K. (2019). A secure fragile watermarking scheme for protecting integrity of digital images. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 43(4), 1–25. https://doi.org/10.1007/s40998-019-00275-7
Hsu, C.-S., & Tu, S.-F. (2010). Probability-based tampering detection scheme for digital images. Optics Communications, 283, 1737–1743. https://doi.org/10.1016/j.optcom.2009.12.073
Sreenivas, K., & Kamakshiprasad, V. (2017). Improved image tamper localisation using chaotic maps and self-recovery. Journal of Visual Communication and Image Representation, 49, 164–176. https://doi.org/10.1016/j.jvcir.2017.09.001
Trivedy, S., & Pal, A. K. (2017). A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 41(2), 1–11. https://doi.org/10.1007/s40998-017-0021-9
Rawat, S., & Raman, B. (2011). A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU), 65, 840–847. https://doi.org/10.1016/j.aeue.2011.01.016
Nazari, M., & Sharif, S. (2017). An improved method for digital image fragile watermarking based on chaotic maps. Multimedia Tools and Applications, 76(15), 16107–16123.
Prasad, S., & Pal, A. K. (2020). A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimedia Tools and Applications, 79(2020), 1673–1705. https://doi.org/10.1007/s11042-019-08144-5
Chang, Y. F., & Tai, W. L. (2013). A block-based watermarking scheme for image tamper detection and self-recovery. Opto Electronics Review, 21(2), 182–190. https://doi.org/10.2478/s11772-013-0088-4
Prasad, S., & Pal, A. K. (2019). Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement. Emerging technologies in data mining and information security. Advances in Intelligent Systems and Computing, 814, 203–214. https://doi.org/10.1007/978-981-13-1501-5_17
Thien, C.-C., & Lin, J. C. (2003). A simple and high-hiding capacity method for hiding digit-by-digit in images based on modulus function. Pattern Recognition, 36, 2875–2881. https://doi.org/10.1016/S0031-3203(03)00221-8
Tanchenko, A. (2014). Visual-psnr measure of image quality. Journal of Visual Communication and Image Representation, 25(5), 874–878. https://doi.org/10.1016/j.jvcir.2014.01.008
Tong, M., Pan, Y., Li, Z., & Lin, W. (2018). Valid data based normalized cross-correlation (VDNCC) for topography identification. Neurocomputing, 308, 184–193. https://doi.org/10.1016/j.neucom.2018.04.059
Soualmi, A., Alti, A., & Laouamer, L. (2022). An imperceptible watermarking scheme for medical image tamper detection. International Journal of Information Security and Privacy, 16(1), 1–18. https://doi.org/10.4018/IJISP.2022010102
Funding
There is no funding for this publication.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Prasad, S., Pal, A.K. & Paul, S. A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wireless Pers Commun 125, 2581–2619 (2022). https://doi.org/10.1007/s11277-022-09675-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09675-1