Skip to main content
Log in

Large scale image tamper detection and restoration

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Detection and restoration of greatly tampered images is an important albeit difficult problem. Two schemes for the detection of tampered areas in images and their restoration have been presented. One of them works in the spatial domain and implements a quadruple watermarking approach. A watermark is constructed from four different parts of the image such that a filtered version of the image intensities contained in each of these parts is embedded identically in four other regions of the image. These regions are decided by a mapping algorithm. The advantage of this approach is that even if three of the four regions are tampered, the watermark from the untampered region can be used to reconstruct the three tampered regions. The chief motivation behind the quadruple scheme is the restoration of an image which has suffered tampering on a really large scale, upto 75%. The other proposed algorithm uses wavelet decomposition, based on which, two different watermarks are embedded. These serve two different purposes, one being tamper detection, while the second is restoration of the tampered area. They are embedded in non-overlapping regions of the wavelet transformed image. This algorithm is designed to obtain very good quality restoration and works well for tampering less than 50% of the total image area. The performance of both these algorithms has been examined using images from the entire USC-SIPI database. Comparison has been made with a well known existing approach. The superiority of the proposed approaches is evident from the plots, figures and tables presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

References

  1. Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and faber-schauder wavelet. AEU - Int J Electron Commun 79:207–218. https://doi.org/10.1016/j.aeue.2017.06.001

    Article  Google Scholar 

  2. Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60. https://doi.org/10.1016/j.displa.2017.01.001

    Article  Google Scholar 

  3. Chuang J-C, Hu Y-C, Lo C-C, Chen W-L (2013) Grayscale image tamper detection and recovery based on vector quantization. International Journal of Security and its Applications 7(6):209–228. https://doi.org/10.14257/ijsia.2013.7.6.22

    Article  Google Scholar 

  4. Criminesi A, Prez P, Toyama K (2004) Region filling and object removal by exemplar-based image inpainting. IEEE Trans Image Process 13(9):1200–1212. https://doi.org/10.1109/TIP.2004.833105

    Article  Google Scholar 

  5. Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210. https://doi.org/10.1016/j.image.2014.09.001

    Article  Google Scholar 

  6. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In: Proceedings of International Conference on Image Processing, (Cat. 99CH36348), vol 3, Kobe, pp 25–28. https://doi.org/10.1109/ICIP.1999.817228

  7. He HJ, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7:1185–196. https://doi.org/10.1109/TIFS.2011.2162950

    Article  Google Scholar 

  8. Hong W, Chen M, Chen TS (2017) An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Processing: Image Communication 58:111–122. https://doi.org/10.1016/j.image.2017.07.001

    Article  Google Scholar 

  9. Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743. https://doi.org/10.1016/j.optcom.2009.12.073

    Article  Google Scholar 

  10. Hsu C-S, Tu S-F (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296. https://doi.org/10.1016/j.measurement.2016.03.053

    Article  Google Scholar 

  11. Izquierdo E, Guerra V (2003) An ill-posed operator for secure image authentication. IEEE Trans Circ Syst Video Technol 13(8):842–852. https://doi.org/10.1109/TCSVT.2003.815961

    Article  Google Scholar 

  12. Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180. https://doi.org/10.1109/5.771070

    Article  Google Scholar 

  13. Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recognit 41(11):3497–3506. https://doi.org/10.1016/j.patcog.2008.05.003

    Article  MathSciNet  MATH  Google Scholar 

  14. Li K-F, Chen T-F, Wu S-C (2001) Image tamper detection and recovery system based on discrete wavelet transformation. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), Victoria, BC, Canada, vol 1, pp 164-167. https://doi.org/10.1109/PACRIM.2001.953548

  15. Lin C-C, Huang Y, Tai W-L (2017) A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimedia Tools and Applications 76(1):463–488. https://doi.org/10.1007/s11042-015-3059-6

    Article  Google Scholar 

  16. Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38(12):2519–2529. https://doi.org/10.1016/j.patcog.2005.02.007

    Article  Google Scholar 

  17. Liu L, Li S, Chen Y, Wang G (2018) X-GANs:, Image Reconstruction Made Easy for Extreme Cases. arXiv:1808.04432

  18. Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image R 22(2):187–200. https://doi.org/10.1016/j.jvcir.2010.12.005

    Article  Google Scholar 

  19. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293. https://doi.org/10.1016/j.sigpro.2017.03.033

    Article  Google Scholar 

  20. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. Journal of Visual Communication and Image Representation 38:775–789. https://doi.org/10.1016/j.jvcir.2016.04.023

    Article  Google Scholar 

  21. Singh D, Singh SK (2017) DCT Based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications 76(1):953–977. https://doi.org/10.1007/s11042-015-3010-x

    Article  Google Scholar 

  22. Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9):165–175

    Google Scholar 

  23. Song J, Guo Y, Gao L, Li X, Hanjalic A, Shen H-T (2018) From deterministic to generative: Multimodal stochastic RNNs for video captioning. IEEE Transactions on Neural Networks and Learning Systems, pp 1–12. https://doi.org/10.1109/TNNLS.2018.2851077

  24. Song J, Zhang H, Li X, Gao L, Wang M, Hong R (2018) Self-supervised video hashing with hierarchical binary auto-encoder. IEEE Trans Image Process 27 (7):3210–3221

    Article  MathSciNet  Google Scholar 

  25. Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self-recovery. J Vis Commun Image Represent 49:164–176. https://doi.org/10.1016/j.jvcir.2017.09.001

    Article  Google Scholar 

  26. Sreenivas K, Kamkshi Prasad V (2008) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9 (7):1193–1218. https://doi.org/10.1007/s13042-017-0641-4

    Article  Google Scholar 

  27. Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU - Int J Electron Commun 78:114–123. https://doi.org/10.1016/j.aeue.2017.05.027

    Article  Google Scholar 

  28. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308. https://doi.org/10.1016/j.image.2012.12.003

    Article  Google Scholar 

  29. USC-SIPI Image Database, University of Southern California. Available online at http://sipi.usc.edu/database

  30. Utku -CM, Sharma G, Saber E, Murat -TA (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595. https://doi.org/10.1109/TIP.2002.1014990

    Article  Google Scholar 

  31. Vafaei M, Mahdavi-Nasab H (2013) A novel digital watermarking scheme using neural networks with tamper detection capability. Journal of Basic and Applied Sciences Research 3(4):577–587

    Google Scholar 

  32. Wang H, Chen W, Lee P (2015) Image tamper detection and recovery based on dilation and chaotic mixing. Computer Science and Information Technology 3(4):127–132. https://doi.org/10.13189/csit.2015.030406

    Article  Google Scholar 

  33. Wang X, Gao L, Wang P, Sun X, Liu X (2018) Two-stream 3-D convNet fusion for action recognition in videos with arbitrary size and length. IEEE Transactions on Multimedia 20(3):634–644. https://doi.org/10.1109/TMM.2017.2749159

    Article  Google Scholar 

  34. Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of International Conference on Image Processing, vol 2. Santa Barbara, pp 680–683. https://doi.org/10.1109/ICIP.1997.638587

  35. Zhang J, Zhang Q, Lv H (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik - International Journal for Light and Electron Optics 124(23):6367–6371. https://doi.org/10.1016/j.ijleo.2013.05.040

    Article  Google Scholar 

  36. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Transactions on Multimedia 10(8):1490–1499. https://doi.org/10.1109/TMM.2008.2007334

    Article  Google Scholar 

  37. Zhu X, Ho A-T-S, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528. https://doi.org/10.1016/j.image.2007.03.004

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank Indian Statistical Institute for providing funds for the work carried out for this article vide the Project Blind quality assessment of images, tamper detection and correction.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Palit.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarkar, D., Palit, S., Som, S. et al. Large scale image tamper detection and restoration. Multimed Tools Appl 79, 17761–17791 (2020). https://doi.org/10.1007/s11042-020-08669-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08669-0

Keywords

Navigation