Abstract
Fragile watermarking is one of the integrity protection mechanisms of multimedia data like image, video, and audio. A secure fragile image watermarking scheme, which is used to detect modification or tampering occurred on the image content, is devised in this paper. The projected scheme is developed into two steps, i.e., computation of secure authentication code/watermark bit from some of the most significant bits of each pixel, and subsequently hides the watermark bit in the least significant bit (LSB) of each pixel by suggested watermark embedding procedure. The watermark bit is concealed into the LSB position of each pixel by a secret sequence obtained from a logistic map. This procedure boosts the security since without knowing the secret sequence, the authentication code extraction from each pixel is not possible. The suggested watermarking approach is assessed on a set of grayscale images, and a decent quality of the watermarked image is visualized. After performing several malicious tampering attacks on the watermarked images, the results of the experiment depict that the tamper detection procedure can effectively locate or identify the altered region from the watermarked image. The scheme is also evaluated based on different estimated quantity parameters like PSNR, FPR, FNR, and Image Fidelity, and satisfactory results are attained.
Similar content being viewed by others
References
Botta M, Cavagnino D, Pomponiu V (2015) A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEU - Int J Electron Commun 69(1):242–245. https://doi.org/10.1016/j.aeue.2014.09.004
Chang C-C, Chen K-N, Lee C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470. https://doi.org/10.1016/j.jss.2011.02.029
Chen W-C, Wang M-S (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307. https://doi.org/10.1016/j.eswa.2007.11.018
Gauravaram P, Knudsen LR (2010) Cryptographic hash functions. Handbook of information and communication security 2010, pp 59–79. https://doi.org/10.1007/978-3-642-04117-4_4
Hemida O, Huo Y, He H, Chen F (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multim Tools Appl. https://doi.org/10.1007/s11042-018-6664-3
Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283:1737–1743. https://doi.org/10.1016/j.optcom.2009.12.073
Khanduja V, Chakraverty S (2018) Fragile watermarking of decision system using rough set theory. Arab J Sci Eng. https://doi.org/10.1007/s13369-018-3120-7
Kittur AS, Pais AR (2017) Batch verification of digital signatures: approaches and challenges. J Inf Secur Appl 37:15–27. https://doi.org/10.1016/j.jisa.2017.09.005
Li M, Xiao D, Zhang Y (2015) Attack and improvement of the fidelity preserved fragile watermarking of digital images. Arab J Sci Eng 41(3):941–950. https://doi.org/10.1007/s13369-015-1941-1
Liao K-C, Lee W-B, Liao C-W (2006) Security of fragile watermarking scheme for image authentication. Imaging Sci J 54:129–133. https://doi.org/10.1179/174313106X106278
Liu S-H, Yao H-X, Gao W, Liu Y-L (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 85(2):869–882. https://doi.org/10.1016/j.amc.2006.07.036
Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105. https://doi.org/10.1016/j.eswa.2017.12.003
Lu C-S (2005) Multimedia security: steganography and digital watermarking techniques for protection of intellectual property. Idea Group Publishing, Hershey
Martino FD, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195:62–90. https://doi.org/10.1016/j.ins.2012.01.014
Martino FD, Sessa S (2018) A fragile watermarking and bilinear fuzzy equations cyberspace safety and security, CSS 2018. Lect Not Comput Sci 11161:240–253. https://doi.org/10.1007/978-3-030-01689-0_19
Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multim Tools Appl 76(15):16107–16123
Oh H, Kim J, Shin JS (2018) Forward-secure ID based digital signature scheme with forward-secure private key generator. Inf Sci 454–455:96–109. https://doi.org/10.1016/j.ins.2018.04.049
Prasanth VS, Chandra MPVSSR (2017a) Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation. Multim Tools Appl 77(5):5609–5635. https://doi.org/10.1007/s11042-017-4476-5
Prasanth VS, Chandra MPVSSR (2017b) A robust semi-blind watermarking for color images based on multiple decompositions. Multim Tools Appl 76(24):25623–25656. https://doi.org/10.1007/s11042-017-4355-0
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Sig Process 138:280–293. https://doi.org/10.1016/j.sigpro.2017.03.033
Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU - Int J Electron Commun 65(10):840–847. https://doi.org/10.1016/j.aeue.2011.01.016
Singh SP, Bhatnagar G (2018) A new robust watermarking system in integer DCT domain. J Vis Commun Image Represent 53:86–101. https://doi.org/10.1016/j.jvcir.2018.03.006
Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self–recovery. J Vis Commun Image Represent 49:164–176. https://doi.org/10.1016/j.jvcir.2017.09.001
Stalling W (2007) Cryptography and network security: principles and practices, 4th edn. Pearson Education, India
Suthaharan S (2010) Logistic map-based fragile watermarking for pixel level tamper detection and resistance. EURASIP J Inf Secur. https://doi.org/10.1155/2010/829516
Teng L, Wang X, Wang X (2013) Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU - Int J Electron Commun 67(6):540–547. https://doi.org/10.1016/j.aeue.2012.12.001
Thanki R, Borra S (2018) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multim Tools Appl. https://doi.org/10.1007/s11042-018-6746-2
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Sig Process Image Commun 28:301–308. https://doi.org/10.1016/j.image.2012.12.003
Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electr Eng 41(2):1–11. https://doi.org/10.1007/s40998-017-0021-9
Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Sig Process 89(4):675–679. https://doi.org/10.1016/j.sigpro.2008.10.001
Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Sig Process 90(12):3026–3036. https://doi.org/10.1016/j.sigpro.2010.04.027
Zhou W, Yu L, Wang Z, Wu M, Luo T, Sun L (2016) Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images. Int J Electron Commun (AEÜ) 70:77–84. https://doi.org/10.1016/j.aeue.2015.10.006
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Prasad, S., Pal, A.K. A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images. Iran J Sci Technol Trans Electr Eng 44, 703–727 (2020). https://doi.org/10.1007/s40998-019-00275-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40998-019-00275-7