Skip to main content
Erschienen in: Wireless Personal Communications 1/2021

24.06.2021

An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code

verfasst von: Pabitra Pal, Biswapati Jana, Jaydeb Bhaumik

Erschienen in: Wireless Personal Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Local Binary Pattern (LBP) has been widely used for texture analysis, feature extraction, visual investigation, pattern matching, and image authentication. It is essential to investigate the effectiveness of LBP, for tamper detection, tamper localization, and ownership identification of a watermarked image, which are highly desirable in many human-centric applications like health-care, military communication, remote sensing, and law enforcement. In this article, a Reversible Watermarking Technique has been introduced to verify image integrity, authenticity and error correction using LBP and Hamming codes. The LBP values have been calculated from (\(2 \times 2\)) original pixel block of the cover image. Then the watermark is inserted within the Least Significant Bit of the interpolated pixels. Here, LBP operator is used to solve image authentication and tamper detection problem whereas Hamming code is used to detect and correct the error in the extraction phase. Some standard NIST recommended steganalysis have been performed to evaluate the robustness and imperceptibility. It is observed that the proposed scheme is secure and robust against various attacks. It can also detect tampered locations and can verify the ownership of an image. Experimental results are compared with the existing watermarking schemes to demonstrate the superiority of the proposed scheme. It also shows good perceptible quality with a high payload and less computational cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Algaet, M. A., Noh, Z. A. B. M., Basari, A. S. B. H., Shibghatullah, A. S., Milad, A. A., Abugharsa, A. B., & Mustapha, A. (2017). Development of robust medical image transmission via Wi-Fi IEEE 802.11 b in the hospital area. Wireless Personal Communications, 95(2), 1617–1634.CrossRef Algaet, M. A., Noh, Z. A. B. M., Basari, A. S. B. H., Shibghatullah, A. S., Milad, A. A., Abugharsa, A. B., & Mustapha, A. (2017). Development of robust medical image transmission via Wi-Fi IEEE 802.11 b in the hospital area. Wireless Personal Communications, 95(2), 1617–1634.CrossRef
2.
Zurück zum Zitat Sharma, A., Singh, A. K., & Ghrera, S. P. (2017). Robust and secure multiple watermarking for medical images. Wireless Personal Communications, 92(4), 1611–1624.CrossRef Sharma, A., Singh, A. K., & Ghrera, S. P. (2017). Robust and secure multiple watermarking for medical images. Wireless Personal Communications, 92(4), 1611–1624.CrossRef
3.
Zurück zum Zitat Alias Sathya, S. P., & Ramakrishnan, S. (2018). Fibonacci based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wireless Personal Communications, 102(2), 2011–2031.CrossRef Alias Sathya, S. P., & Ramakrishnan, S. (2018). Fibonacci based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wireless Personal Communications, 102(2), 2011–2031.CrossRef
4.
Zurück zum Zitat Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Personal Communications, 71(3), 1977–1988.CrossRef Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Personal Communications, 71(3), 1977–1988.CrossRef
5.
Zurück zum Zitat Banu, N. M., & Sujatha, S. (2015). Improved tampering detection for image authentication based on image partitioning. Wireless Personal Communications, 84(1), 69–85.CrossRef Banu, N. M., & Sujatha, S. (2015). Improved tampering detection for image authentication based on image partitioning. Wireless Personal Communications, 84(1), 69–85.CrossRef
7.
Zurück zum Zitat Thirunavukkarasu, V., Kumar, J. S., Chae, G. S., & Kishorkumar, J. (2018). Non-intrusive forensic detection method using DSWT with reduced feature set for copy-move image tampering. Wireless Personal Communications, 98(4), 3039–3057.CrossRef Thirunavukkarasu, V., Kumar, J. S., Chae, G. S., & Kishorkumar, J. (2018). Non-intrusive forensic detection method using DSWT with reduced feature set for copy-move image tampering. Wireless Personal Communications, 98(4), 3039–3057.CrossRef
8.
Zurück zum Zitat Fridrich, J., Goljan, M., & Du, R. (2001). Invertible authentication. In Security and watermarking of multimedia contents III (Vol. 4314, pp. 197–209). International Society for Optics and Photonics. Fridrich, J., Goljan, M., & Du, R. (2001). Invertible authentication. In Security and watermarking of multimedia contents III (Vol. 4314, pp. 197–209). International Society for Optics and Photonics.
9.
Zurück zum Zitat Phiasai, T., Temdee, P., & Chamnongthai, K. (2015). An anti-cropping watermarking method for facial images using prediction and Weber ratio techniques. Wireless Personal Communications, 85(2), 421–448.CrossRef Phiasai, T., Temdee, P., & Chamnongthai, K. (2015). An anti-cropping watermarking method for facial images using prediction and Weber ratio techniques. Wireless Personal Communications, 85(2), 421–448.CrossRef
10.
Zurück zum Zitat Noor, R., Khan, A., & Sarfaraz, A. (2019). High performance and energy efficient image watermarking for video using a mobile device. Wireless Personal Communications, 104(4), 1535–1551.CrossRef Noor, R., Khan, A., & Sarfaraz, A. (2019). High performance and energy efficient image watermarking for video using a mobile device. Wireless Personal Communications, 104(4), 1535–1551.CrossRef
11.
Zurück zum Zitat Zhang, H., Wang, C., & Zhou, X. (2017). An improved secure semi-fragile watermarking based on LBP and Arnold transform. Journal of Information Processing Systems, 13(5), 1382–1396. Zhang, H., Wang, C., & Zhou, X. (2017). An improved secure semi-fragile watermarking based on LBP and Arnold transform. Journal of Information Processing Systems, 13(5), 1382–1396.
12.
Zurück zum Zitat Su, Q., Niu, Y., Wang, Q., & Sheng, G. (2013). A blind color image watermarking based on DC component in the spatial domain. Optik-International Journal for Light and Electron Optics, 124(23), 6255–6260.CrossRef Su, Q., Niu, Y., Wang, Q., & Sheng, G. (2013). A blind color image watermarking based on DC component in the spatial domain. Optik-International Journal for Light and Electron Optics, 124(23), 6255–6260.CrossRef
13.
Zurück zum Zitat Verma, V. S., Jha, R. K., & Ojha, A. (2015). Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Systems with Applications, 42(21), 8184–8197.CrossRef Verma, V. S., Jha, R. K., & Ojha, A. (2015). Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Systems with Applications, 42(21), 8184–8197.CrossRef
14.
Zurück zum Zitat Ojala, T., Pietikainen, M., & Maenpaa, T. (2002). Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(7), 971–987.CrossRef Ojala, T., Pietikainen, M., & Maenpaa, T. (2002). Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(7), 971–987.CrossRef
15.
Zurück zum Zitat Wenyin, Z., & Shih, F. Y. (2011). Semi-fragile spatial watermarking based on local binary pattern operators. Optics Communications, 284(16–17), 3904–3912.CrossRef Wenyin, Z., & Shih, F. Y. (2011). Semi-fragile spatial watermarking based on local binary pattern operators. Optics Communications, 284(16–17), 3904–3912.CrossRef
16.
Zurück zum Zitat Roy, S. K., Chanda, B., Chaudhuri, B. B., Banerjee, S., Ghosh, D. K., & Dubey, S. R. (2018). Local directional ZigZag pattern: A rotation invariant descriptor for texture classification. Pattern Recognition Letters, 108, 23–30.CrossRef Roy, S. K., Chanda, B., Chaudhuri, B. B., Banerjee, S., Ghosh, D. K., & Dubey, S. R. (2018). Local directional ZigZag pattern: A rotation invariant descriptor for texture classification. Pattern Recognition Letters, 108, 23–30.CrossRef
17.
Zurück zum Zitat Wei, X., Wang, H., Guo, G., & Wan, H. (2018). Multiplex image representation for enhanced recognition. International Journal of Machine Learning and Cybernetics, 9(3), 383–392.CrossRef Wei, X., Wang, H., Guo, G., & Wan, H. (2018). Multiplex image representation for enhanced recognition. International Journal of Machine Learning and Cybernetics, 9(3), 383–392.CrossRef
18.
Zurück zum Zitat Chang, J. D., Chen, B. H., & Tsai, C. S. (2013). LBP-based fragile watermarking scheme for image tamper detection and recovery. In 2013 international symposium on next-generation electronics (pp. 173–176). IEEE. Chang, J. D., Chen, B. H., & Tsai, C. S. (2013). LBP-based fragile watermarking scheme for image tamper detection and recovery. In 2013 international symposium on next-generation electronics (pp. 173–176). IEEE.
19.
Zurück zum Zitat Ding, F., Zhu, G., & Shi, Y. Q. (2013). A novel method for detecting image sharpening based on local binary pattern. In International workshop on digital watermarking (pp. 180–191). Springer, Berlin, Heidelberg. Ding, F., Zhu, G., & Shi, Y. Q. (2013). A novel method for detecting image sharpening based on local binary pattern. In International workshop on digital watermarking (pp. 180–191). Springer, Berlin, Heidelberg.
20.
Zurück zum Zitat Pinjari, S. A., & Patil, N. N. (2016). A pixel based fragile watermarking technique using LBP (Local Binary Pattern). In 2016 international conference on global trends in signal processing, information computing and communication (ICGTSPICC) (pp. 194–196). IEEE. Pinjari, S. A., & Patil, N. N. (2016). A pixel based fragile watermarking technique using LBP (Local Binary Pattern). In 2016 international conference on global trends in signal processing, information computing and communication (ICGTSPICC) (pp. 194–196). IEEE.
21.
Zurück zum Zitat Alahmadi, A., Hussain, M., Aboalsamh, H., Muhammad, G., Bebis, G., & Mathkour, H. (2017). Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing, 11(1), 81–88.CrossRef Alahmadi, A., Hussain, M., Aboalsamh, H., Muhammad, G., Bebis, G., & Mathkour, H. (2017). Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing, 11(1), 81–88.CrossRef
22.
Zurück zum Zitat Pan, X., & Lyu, S. (2010). Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 5(4), 857–867.CrossRef Pan, X., & Lyu, S. (2010). Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 5(4), 857–867.CrossRef
23.
Zurück zum Zitat Mishra, P., Mishra, N., Sharma, S., & Patel, R. (2013). Region duplication forgery detection technique based on SURF and HAC. The Scientific World Journal, 2013, 267691. Mishra, P., Mishra, N., Sharma, S., & Patel, R. (2013). Region duplication forgery detection technique based on SURF and HAC. The Scientific World Journal, 2013, 267691.
24.
Zurück zum Zitat Uliyan, D. M., Jalab, H. A., & Wahab, A. W. A. (2015). Copy move image forgery detection using Hessian and center symmetric local binary pattern. In 2015 IEEE Conference on Open Systems (ICOS) (pp. 7–11). IEEE. Uliyan, D. M., Jalab, H. A., & Wahab, A. W. A. (2015). Copy move image forgery detection using Hessian and center symmetric local binary pattern. In 2015 IEEE Conference on Open Systems (ICOS) (pp. 7–11). IEEE.
25.
Zurück zum Zitat Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards & Interfaces, 31(2), 465–470.CrossRef Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards & Interfaces, 31(2), 465–470.CrossRef
26.
Zurück zum Zitat Lee, C. F., & Huang, Y. L. (2012). An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications, 39(8), 6712–6719.CrossRef Lee, C. F., & Huang, Y. L. (2012). An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications, 39(8), 6712–6719.CrossRef
27.
Zurück zum Zitat Hu, J., & Li, T. (2015). Reversible steganography using extended image interpolation technique. Computers & Electrical Engineering, 46, 447–455.CrossRef Hu, J., & Li, T. (2015). Reversible steganography using extended image interpolation technique. Computers & Electrical Engineering, 46, 447–455.CrossRef
28.
Zurück zum Zitat Parah, S. A., Sheikh, J. A., Loan, N. A., & Bhat, G. M. (2017). A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In Multimedia forensics and security (pp. 223–252). Springer, Cham. Parah, S. A., Sheikh, J. A., Loan, N. A., & Bhat, G. M. (2017). A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In Multimedia forensics and security (pp. 223–252). Springer, Cham.
29.
Zurück zum Zitat Jana, B. (2016). High payload reversible data hiding scheme using weighted matrix. Optik-International Journal for Light and Electron Optics, 127(6), 3347–3358.CrossRef Jana, B. (2016). High payload reversible data hiding scheme using weighted matrix. Optik-International Journal for Light and Electron Optics, 127(6), 3347–3358.CrossRef
30.
Zurück zum Zitat Jana, B., Giri, D., & Mondal, S. K. (2018). Dual image based reversible data hiding scheme using (7, 4) Hamming code. Multimedia Tools and Applications, 77(1), 763–785.CrossRef Jana, B., Giri, D., & Mondal, S. K. (2018). Dual image based reversible data hiding scheme using (7, 4) Hamming code. Multimedia Tools and Applications, 77(1), 763–785.CrossRef
31.
Zurück zum Zitat Nguyen, T. D., & Le, H. D. (2021). A reversible data hiding scheme based on (5, 3) Hamming code using extra information on overlapped pixel blocks of grayscale images. Multimedia Tools and Applications, 80, 13099–13120.CrossRef Nguyen, T. D., & Le, H. D. (2021). A reversible data hiding scheme based on (5, 3) Hamming code using extra information on overlapped pixel blocks of grayscale images. Multimedia Tools and Applications, 80, 13099–13120.CrossRef
36.
Zurück zum Zitat Martin, D., Fowlkes, C., Tal, D., & Malik, J. (2001). A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In Proceedings Eighth IEEE international conference on computer vision (p. 416). IEEE. Martin, D., Fowlkes, C., Tal, D., & Malik, J. (2001). A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In Proceedings Eighth IEEE international conference on computer vision (p. 416). IEEE.
Metadaten
Titel
An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code
verfasst von
Pabitra Pal
Biswapati Jana
Jaydeb Bhaumik
Publikationsdatum
24.06.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08666-y

Weitere Artikel der Ausgabe 1/2021

Wireless Personal Communications 1/2021 Zur Ausgabe

Neuer Inhalt