Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking

  • Sajjad Dadkhah
  • Azizah Abd Manaf
  • Somayeh Sadeghi
Part of the Intelligent Systems Reference Library book series (ISRL, volume 70)


Due to the increasing number of forged images and possibilities of effortless digital manipulations, certain organizations have started to focus on approaches that help preserve their digital data integrity. Image authentication systems try to accurately verify the integrity of digital images, of which digital watermarking is known to be one of the most precise techniques in authenticating the originality of digital images. This chapter has presented a novel image authentication system with accurate tamper localization ability. In the proposed algorithm a 16-bit watermark key has been created from each block of pixels in a host image. The generated 16-bit watermark key will be embedded into the host image by utilizing a fragile watermarking algorithm. The security of the watermarking algorithm will be ensured by using the proposed block cipher algorithm, which encrypts the user key and watermarking algorithm. The proposed tamper detection algorithm conducts two comprehensive comparisons, to ensure the accuracy of the results. The high quality watermarks and powerful tamper detection approaches, along with less computational complexity are the main advantages of the proposed image authentication system, which makes it suitable for real-time application. Several tampering experiments have been conducted to examine the proposed algorithm. The experiment results have clearly proved that, the proposed method is not only efficient, but also very accurate in detecting different types of digital image manipulations, such as, small region tampering, cropping tampering and bit tampering.


Image authentication Tamper detection Active watermarking Tamper localization Fragile watermarking 


  1. 1.
    Vrusias, B., et al.: Forensic Photography. University of Surrey, Computing Department (2001). Technical ReportGoogle Scholar
  2. 2.
    Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)CrossRefGoogle Scholar
  3. 3.
    Ho, A.T.: Semi-fragile watermarking and authentication for law enforcement applications. In: Innovative Computing, Information and Control, p. 286 (2007)Google Scholar
  4. 4.
    Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: IEEE image processing, (1997)Google Scholar
  5. 5.
    Cox, I., et al.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, USA (2007)Google Scholar
  6. 6.
    Lin, W., et al.: Multimedia Analysis, Processing and Communications, vol. 346, p. 139183 (2011)Google Scholar
  7. 7.
    Chang, C.-C., Hu, Y.-S., Lu, T.-C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)CrossRefGoogle Scholar
  8. 8.
    Lin, T.-C., Lin, C.-M.: Wavelet-based copyright-protection scheme for digital images based on local features. Inf. Sci. 179(19), 3349–3358 (2009)CrossRefGoogle Scholar
  9. 9.
    Guo, H., Georganas, N.D.: Jointly verifying ownership of an image using digital watermarking. Multimedia Tools Appl. 27(3), 323–349 (2005)CrossRefGoogle Scholar
  10. 10.
    Zhu, X., Ho, A.T., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process.: Image Commun. 22(5), 515–528 (2007)Google Scholar
  11. 11.
    Tsolis, D., et al.: Applying robust multibit watermarks to digital images. J. Comput. Appl. Math. 227(1), 213–220 (2009)CrossRefMATHMathSciNetGoogle Scholar
  12. 12.
    Huang, C.-H., Wu, J.-L.: Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes. Inf. Sci. 179(6), 791–808 (2009)CrossRefGoogle Scholar
  13. 13.
    Wang, S.-S., Tsai, S.-L.: Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn. 41(2), 701–712 (2008)CrossRefMATHGoogle Scholar
  14. 14.
    Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)CrossRefGoogle Scholar
  15. 15.
    Yu, G.-J., Lu, C.-S., Liao, H.-Y.M.: Mean-quantization-based fragile watermarking for image authentication. Opt. Eng. 40(7), 1396–1408 (2001)CrossRefGoogle Scholar
  16. 16.
    Li, C.-T., Si, H.: Wavelet-based fragile watermarking scheme for image authentication. J. Electron. Imaging 16(1), 013009–013009-9 (2007)Google Scholar
  17. 17.
    Yen, E., Tsai, K.-S.: HDWT-based grayscale watermark for copyright protection. Expert Syst. Appl. 35(1), 301–306 (2008)CrossRefGoogle Scholar
  18. 18.
    Lin, C.-Y., Chang, S.-F.: Semifragile watermarking for authenticating JPEG visual content. In: Electronic Imaging. International Society for Optics and Photonics, (2000)Google Scholar
  19. 19.
    Lin, H.-Y.S., et al.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)CrossRefGoogle Scholar
  20. 20.
    Zhang, X., et al.: Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12), 3026–3036 (2010)CrossRefMATHGoogle Scholar
  21. 21.
    Wong, P.W.: A public key watermark for image verification and authentication. In: Image Processing, ICIP 98. pp. 455–459, (1998)Google Scholar
  22. 22.
    Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proceeding of SPIE Security and Watermarking of Multimedia Contents, pp. 691–700 (2002)Google Scholar
  23. 23.
    Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–730 (2007)CrossRefGoogle Scholar
  24. 24.
    Ohkita, K., et al.: Improving capability of locating tampered pixels of statistical fragile watermarking, In: Digital Watermarking, pp. 279–293. Springer, (2009)Google Scholar
  25. 25.
    Lin, S.D., Kuo, Y.-C., Huang, Y.-H.: An image watermarking scheme with tamper detection and recovery. In: IEEE Innovative Computing, Information and Control, (2006)Google Scholar
  26. 26.
    Chang, C.-C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 41(2), 654–661 (2008)CrossRefMATHGoogle Scholar
  27. 27.
    Zhang, X., Wang, S.: Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4), 675–679 (2009)CrossRefMATHGoogle Scholar
  28. 28.
    Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRefMATHGoogle Scholar
  29. 29.
    Chaluvadi, S.B., Prasad, M.V.: Efficient image tamper detection and recovery technique using dual watermark. In: Nature & Biologically Inspired Computing, (2009)Google Scholar
  30. 30.
    Lin, E.T., Podilchuk, C.I., Delp, E.J.: III Detection of image alterations using semifragile watermarks. In: Electronic Imaging, (2000)Google Scholar
  31. 31.
    Ho, A.T., Zhu, X., Woon, W.: A semi-fragile pinned sine transform watermarking system for content authentication of satellite images. In: IEEE Geoscience and Remote Sensing Symposium, (2005)Google Scholar
  32. 32.
    Zhao, X., Bateman, P., Ho, A.T.: Image Authentication Using Active Watermarking and Passive Forensics Techniques, in Multimedia Analysis, Processing and Communications, pp. 139–183. Springer, (2011)Google Scholar
  33. 33.
    Rosales-Roldan, L., et al.: Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process. Image Commun. 28(1), 69–83 (2013)CrossRefGoogle Scholar
  34. 34.
    Tong, X., et al.: A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28(3), 301–308 (2013)CrossRefGoogle Scholar
  35. 35.
    Dadkhah, S., Manaf, A.A., Sadeghi, S.: Efficient digital image authentication and tamper localization technique using 3Lsb watermarking. Int. J. Comput. Sci. Issues (IJCSI), 9(1), (2012)Google Scholar
  36. 36.
    Hsu, C.-S., Tu, S.-F.: Image tamper detection and recovery using differential embedding strategy. In: IEEE Communications, Computers and Signal Processing (PacRim), (2011)Google Scholar
  37. 37.
    Yeo, D.-G., Lee, H.-Y.: Block-based image authentication algorithm using reversible watermarking, In: Computer Science and Convergence, pp. 703–711. Springer (2012)Google Scholar
  38. 38.
    Weber, A.G.: The USC-SIPI image database version 5. USC-SIPI Rep. 315, 1–24 (1997)Google Scholar
  39. 39.
    Pullen, M. Crime Scene. High Fashion Crime Scenes, (2010) http://www.melaniepullen.com/
  40. 40.
    Christlein, V., et al.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7(6), 1841–1854 (2012)CrossRefGoogle Scholar
  41. 41.
    Perona, M.F.A.P.: Computational vision at Caltech. [Image database], (2010) http://www.vision.caltech.edu/archive.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Sajjad Dadkhah
    • 1
  • Azizah Abd Manaf
    • 2
  • Somayeh Sadeghi
    • 3
  1. 1.Faculty of ComputingUniversiti Teknologi MalaysiaKuala LumpurMalaysia
  2. 2.Advanced Informatics SchoolUniversiti Teknologi MalaysiaKuala LumpurMalaysia
  3. 3.Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala LumpurMalaysia

Personalised recommendations