Abstract
Digital images play a vital role in human life. Hence, its protection from unauthorized access is a serious matter of concern. Even if the contents are modified then its detection and recovery must be defined. Nowadays, a number of methods are proposed to protect digital images based on digital watermarking. But all are not with similar capability in terms of security, authenticity, recovery. This paper represents the basics of digital watermarking techniques along with their competency and weakness for the detection of tampered images and their recovery process. A series of watermarking techniques with simulated results show their working efficiency with quantitative result analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bhargava, N., M.M. Sharma, A.S. Garhwal, and M. Mathuria. 2012. Digital image authentication system based on digital watermarking. In IEEE International Conference on Radar, Communication, and Computing (ICRCC). https://doi.org/10.1109/icrcc.2012.6450573.
Van Schyndel, R.G., A.Z. Tirkel, and C.F. Osborne. 1994. A digital watermark. In Proceedings of the IEEE International Conference on Image Processing, vol. 2, 86-90.
Tamal, T.A., C. Saha, M.D. Foisal Hossain, and S. Rahman. 2019. Integer wavelet transform based medical image watermarking for tamper detection. In International Conference on Electrical, Computer and Communication Engineering (ECCE), 7–9. https://doi.org/10.1109/ecace.2019.8679152.
Lin, P.L., C.K. Hsieh, and P.W. Huang. 2005. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38: 2519–2529.
Lee, T.Y., and S.D. Lin. 2008. Dual watermarking for image tamper detection and recovery. Pattern Recognition 41: 3497–3506.
Yang, C.W., and J.J. Shen. 2010. Recover the tampered image based on VQ indexing. Signal Processing 90: 331–343.
Wong, P.W., and N. Memon. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10: 1593–1601.
Li, Chunlei, Y. Wang, B. Ma, and Z. Zhang. 2011. A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Computers and Electrical Engineering 37: 927–940.
He, H., F. Chen, H.M. Tai, T. Kalker, and J. Zhang. 2012. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security 7: 185–196.
Qin, C., C.C. Chang, and P.Y. Chen. 2012. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Processing 92: 1137–1150.
Adiwijaya, P.N. Faoziyah, F.P. Permana, T.A.B. Wirayuda, and U.N. Wisesty. 2013. Tamper detection and recovery of medical image watermarking using modified LSB and Huffman compression. In Second International Conference on Informatics & Applications (ICIA), 129–132.
Tong, X.J., Y. Liu, M. Zhang, and Y. Chen. 2013. A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication 28: 301–308.
Shivananda, N., and K.R. Chetan. 2014. A new fragile watermarking approach for tamper detection and recovery of document images. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 1494–1498.
Dhole, V.S., and N.N. Patil. 2016. Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In International Conference on Computing Communication Control and Automation, 752–757.
Sreenivas, K., and V.K. Prasad. 2016. Improved block encoding method for an image self-recovery approach. In International Conference on Information Communication and Embedded Systems (ICICES), 3–7.
Molina-Garcia, J., R.R. Reyes, V. Pronomaryov, and C.C. Ramos. 2016. Watermarking algorithm for authentication and self-recovery of tampered images using DWT. In 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW), 1–4.
Shehab, A., M. Elhoseny, K. Muhammad, and A.K. Sangaiah. 2018. Secure and robust fragile watermarking scheme for medical images. IEEE Access 6: 10269–10278.
Liu, X., J. Lou, H. Fan, Y. Chen, P. Ouyang, Y. Wang, B. Zou, and L. Wang. 2019. A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7: 76580–76598.
Tamal, T.A., C. Saha, and S. Rahman. 2019. Integer wavelet transform based medical image watermarking for tamper detection. In International Conference on Electrical, Computer and Communication Engineering (ECCE). https://doi.org/10.1109/ecace.2019.8679152.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Swain, M., Swain, D., Paikaray, B.K. (2020). A Competitive Analysis on Digital Image Tamper Detection and Its Secure Recovery Techniques Using Watermarking. In: Swain, D., Pattnaik, P., Gupta, P. (eds) Machine Learning and Information Processing. Advances in Intelligent Systems and Computing, vol 1101. Springer, Singapore. https://doi.org/10.1007/978-981-15-1884-3_43
Download citation
DOI: https://doi.org/10.1007/978-981-15-1884-3_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1883-6
Online ISBN: 978-981-15-1884-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)