Skip to main content

A Competitive Analysis on Digital Image Tamper Detection and Its Secure Recovery Techniques Using Watermarking

  • Conference paper
  • First Online:
Machine Learning and Information Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1101))

Abstract

Digital images play a vital role in human life. Hence, its protection from unauthorized access is a serious matter of concern. Even if the contents are modified then its detection and recovery must be defined. Nowadays, a number of methods are proposed to protect digital images based on digital watermarking. But all are not with similar capability in terms of security, authenticity, recovery. This paper represents the basics of digital watermarking techniques along with their competency and weakness for the detection of tampered images and their recovery process. A series of watermarking techniques with simulated results show their working efficiency with quantitative result analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhargava, N., M.M. Sharma, A.S. Garhwal, and M. Mathuria. 2012. Digital image authentication system based on digital watermarking. In IEEE International Conference on Radar, Communication, and Computing (ICRCC). https://doi.org/10.1109/icrcc.2012.6450573.

  2. Van Schyndel, R.G., A.Z. Tirkel, and C.F. Osborne. 1994. A digital watermark. In Proceedings of the IEEE International Conference on Image Processing, vol. 2, 86-90.

    Google Scholar 

  3. Tamal, T.A., C. Saha, M.D. Foisal Hossain, and S. Rahman. 2019. Integer wavelet transform based medical image watermarking for tamper detection. In International Conference on Electrical, Computer and Communication Engineering (ECCE), 7–9. https://doi.org/10.1109/ecace.2019.8679152.

  4. Lin, P.L., C.K. Hsieh, and P.W. Huang. 2005. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38: 2519–2529.

    Article  Google Scholar 

  5. Lee, T.Y., and S.D. Lin. 2008. Dual watermarking for image tamper detection and recovery. Pattern Recognition 41: 3497–3506.

    Google Scholar 

  6. Yang, C.W., and J.J. Shen. 2010. Recover the tampered image based on VQ indexing. Signal Processing 90: 331–343.

    Article  Google Scholar 

  7. Wong, P.W., and N. Memon. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10: 1593–1601.

    Article  Google Scholar 

  8. Li, Chunlei, Y. Wang, B. Ma, and Z. Zhang. 2011. A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Computers and Electrical Engineering 37: 927–940.

    Google Scholar 

  9. He, H., F. Chen, H.M. Tai, T. Kalker, and J. Zhang. 2012. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security 7: 185–196.

    Google Scholar 

  10. Qin, C., C.C. Chang, and P.Y. Chen. 2012. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Processing 92: 1137–1150.

    Google Scholar 

  11. Adiwijaya, P.N. Faoziyah, F.P. Permana, T.A.B. Wirayuda, and U.N. Wisesty. 2013. Tamper detection and recovery of medical image watermarking using modified LSB and Huffman compression. In Second International Conference on Informatics & Applications (ICIA), 129–132.

    Google Scholar 

  12. Tong, X.J., Y. Liu, M. Zhang, and Y. Chen. 2013. A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication 28: 301–308.

    Google Scholar 

  13. Shivananda, N., and K.R. Chetan. 2014. A new fragile watermarking approach for tamper detection and recovery of document images. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 1494–1498.

    Google Scholar 

  14. Dhole, V.S., and N.N. Patil. 2016. Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In International Conference on Computing Communication Control and Automation, 752–757.

    Google Scholar 

  15. Sreenivas, K., and V.K. Prasad. 2016. Improved block encoding method for an image self-recovery approach. In International Conference on Information Communication and Embedded Systems (ICICES), 3–7.

    Google Scholar 

  16. Molina-Garcia, J., R.R. Reyes, V. Pronomaryov, and C.C. Ramos. 2016. Watermarking algorithm for authentication and self-recovery of tampered images using DWT. In 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW), 1–4.

    Google Scholar 

  17. Shehab, A., M. Elhoseny, K. Muhammad, and A.K. Sangaiah. 2018. Secure and robust fragile watermarking scheme for medical images. IEEE Access 6: 10269–10278.

    Google Scholar 

  18. Liu, X., J. Lou, H. Fan, Y. Chen, P. Ouyang, Y. Wang, B. Zou, and L. Wang. 2019. A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7: 76580–76598.

    Google Scholar 

  19. Tamal, T.A., C. Saha, and S. Rahman. 2019. Integer wavelet transform based medical image watermarking for tamper detection. In International Conference on Electrical, Computer and Communication Engineering (ECCE). https://doi.org/10.1109/ecace.2019.8679152.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bijay Ku. Paikaray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Swain, M., Swain, D., Paikaray, B.K. (2020). A Competitive Analysis on Digital Image Tamper Detection and Its Secure Recovery Techniques Using Watermarking. In: Swain, D., Pattnaik, P., Gupta, P. (eds) Machine Learning and Information Processing. Advances in Intelligent Systems and Computing, vol 1101. Springer, Singapore. https://doi.org/10.1007/978-981-15-1884-3_43

Download citation

Publish with us

Policies and ethics