You are on page 1of 12

Journal of Ambient Intelligence and Humanized Computing

https://doi.org/10.1007/s12652-020-02135-3

ORIGINAL RESEARCH

A secure image watermarking for tamper detection and localization


Siddharth Bhalerao1 · Irshad Ahmad Ansari1   · Anil Kumar1

Received: 6 September 2019 / Accepted: 15 May 2020


© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract
Data security has become a major concern of present time. Digital image watermarking is seen as a viable solution to ensure
the integrity of image data. Watermarking algorithms can detect the presence of various attacks on images. In this work, a
secure and efficient fragile image watermarking technique is proposed. The proposed watermarking algorithm aims to find
image tampering and its location. The proposed approch is a spatial domain, block-based embedding technique. It introduces
a unique key based embedding using SHA-1 (Secure Hashing Algorithm) hashing. The watermarked images have high PSNR
and SSIM. The algorithm can handle various size of tampering, from very small to large. The proposed technique has been
tested for a wide variety of tampering attacks like copy-paste, copy-move, constant average, and general tampering. It can
efficiently detect tampering in the presence of these attacks.

Keywords  Image watermarking · Tamper detection · Tamper localization · Copy-paste attack · Copy-move forgery ·
Constant average attack

1 Introduction schemes become an important part of multimedia security


tools.
It is the age of information and communication technology To ensure data security and integrity, digital cryptogra-
that makes data security a prime requirement. The huge phy, watermarking, and steganography are seen as potential
amount of data is flowing through the internet, present in solutions. In cryptography, different codes are used to secure
cloud storage, or stored on hard drives. To curb the illegal the information. In encryption techniques, the impression
use of multimedia, ownership detection is used. By using of data itself gets changed. The encrypted information can
ownership detection techniques, the rightful owner of the only be extracted using a valid key. Steganography is another
multimedia content could be identifed. Similarly, there is way to protect the information. Steganography means hid-
abundance of softwares, that could easily edit the multime- den writing. In steganography, a secret message is concealed
dia content. Image and video editors are example of such within another signal, which could be audio, video, or image
softwares. It becomes difficult for the persons with limited file. Hiding and sharing secret information is one of the
skills to identify any such tampering. In this scenario, such main applications of steganography (Gutub and Al-juaid
tampering could affect decisions of individuals or even 2018; Gutub et al. 2019). When secret information is part
organisatios. A tampered medical image or signal may lead of images it is called as digital image steganography (Gutub
to unthinkable results. Therefore, these tampering detection et al. 2008; Gutub 2010; Parvez and Gutub 2011). Various
research works (Khan and Gutub 2007; Parvez and Gutub
2008; Gutub and Al-Qahtani 2009; Abu-Marie et al. 2010)
* Irshad Ahmad Ansari discussed about different image steganography methods.
irshad@iiitdmj.ac.in The watermarking is another way to protect the informa-
Siddharth Bhalerao tion from being misuse. Watermarking based security comes
siddharthbhalerao@gmail.com with the additional benefit of original data’s shape preserva-
Anil Kumar tion. Digital watermarking can be done on any media like
anilkdee@gmail.com image, audio and video. When watermarking is used to
1
Electronics and Communication, PDPM Indian Institute
maintain the integrity of images, it is termed as digital image
of Information Technology Design and Manufacturing, watermarking. Digital image watermarking has multiple
Jabalpur, India

13
Vol.:(0123456789)
S. Bhalerao et al.

motives like copyright protection, content authentication, a message-digest was used as watermark. The digest was
tamper detection, etc. (Potdar et al. 2005). Apart from it, generated from the image itself. Before embedding, encryp-
watermarking is also used to identify the image tampering tion was used to secure the watermark. During extraction,
and sometimes to recover the lost information (Wang et al. embedded data was separated from the LSB bit plane. The
2018). Various ways may tamper the images, like noise, digest was again generated from the received image. When
unauthorized access, and illegal activity. embedded digest and generated digest were found to be
In watermarking, a signal (called as the watermark) is equal, it indicated no tampering was there.
embedded into a host signal, which is an image in the case Another spatial domain method for medical image secu-
of digital image watermarking. The resultant image is called rity was proposed by (Tan et al. 2011). It was a dual-layer
a watermarked image. When the requirement is copyright watermarking scheme with tamper localization ability. Simi-
protection, it is expected that embedded watermark remains lar to the above work, this method was also based on cryp-
secured even in the presence of attacks on the image. Thus, tography, and it was implemented for DICOM images. The
watermark can be extracted from the attacked image too and medical image was firstly fragmented in blocks of 16 × 16
ownership can be established. Such watermarking is called pixels and CRC (cyclic redundancy check) was calculated
robust watermarking (Mohanarathinam et al. 2019; Singh for each block. The computed CRC was embedded in the
and Bhatnagar 2019). In fragile watermarking, the main block itself. The process was repeated during extraction, the
purpose is identification of image tampering (Di Martino mismatch in CRC indicated tampering. This method was
and Sessa 2019). Thus, when the image gets tampered, the a reversible scheme with tamper localization ability. How-
watermark should also gets damaged, indicating image tam- ever, embedding CRC of a block in the same block itself
pering. Watermarking is a useful tool in the telemedicine was a drawback of this method. Spatial domain techniques
industry, which is used to ensure the integrity of medical are mostly used to implement fragile watermarking. To
data (Giakoumaki et al. 2006). In the telemedicine industry increase the robustness of watermarking algorithms trans-
patient data is stored electronically in the form of the elec- form domain techniques were implemented.
tronic patient record (EPR). The major portions of EPR con- Qi and Xin (2015) proposed a transform domain tech-
tains medical images like X-rays, CT scans, MRI, etc. (Rao nique using singular value decomposition (SVD). It was
and Kumari 2011). These images are of sensitive nature and a semi-fragile technique using the wavelet transform. To
watermarking is a necessity to identify tampering (Zain and enhance security, the watermark was generated using a
Clarke 2005). private key. At the time of extraction, the watermark was
Watermarking can be performed in the spatial domain regenerated. An error map was created after comparing the
or transform domain (Mousavi et al. 2014). Although there regenerated watermark with the embedded watermark. This
is no such rule, but transform domain is mostly used, when scheme outperformed many of its contemporary schemes,
robustness is the required characteristic. When it is possible but its embedding capacity was less.
to extract (from the watermarked image) the host image in The security of watermark can be increased using source
its original (100%) form, then such watermarking is called coding techniques. A technique using such codes was pro-
reversible watermarking (Arsalan et al. 2012). Watermark- posed by Singh et al. (2015). It was a secure and robust
ing can also be classified as blind and non-blind (Rey and watermarking technique for medical images. It used BCH
Dugelay 2002). When watermarking is non-blind, both host codes (Bose, Chaudhuri, and Hocquenghem) to encode the
image and watermark are required during data extraction. watermark before embedding it. BCH codes are known for
A discussion of the earlier developed techniques related to their error-correcting capabilities. This method was a trans-
digital image watermarking is present in the next section. form domain approach and DWT (discrete wavelet trans-
form) was used. Watermark was first converted into ASCII
code and then BCH was applied to it, to increase the robust-
2 Related work ness. Three separate watermarks were embedded in selected
sub-band of a three level wavelet decomposition of medical
Different techniques have been reported in the past for digi- image. Their method performed well against a variety of
tal image watermarking. Each technique has its specialty. attacks, providing high imperceptibility and PSNR (peak
In spatial domain, the bit substitution is one of the simplest signal to noise ratio). However, low payload capacity was
methods of watermarking (Potdar et  al. 2005). Khamli- the drawback of this scheme.
chi (Khamlichi et al. 2006) has proposed a watermarking A blind watermarking technique for medical images
method based on LSB substitution. It was a medical image was proposed in Thakkar and Srivastava (2017). It too was
watermarking technique to preserve the integrity of medical based on error-correcting codes. It embeds two watermarks
images. In their technique patient’s confidential data and to increase the robustness of the scheme, one of which was

13
A secure image watermarking for tamper detection and localization

a logo and the other one was text data. Patient data act as LSBs of the image. Another method, with a large scale tam-
text watermark, which was secured through error-correcting per detection ability, was proposed by Sarkar et al. (2020). In
codes. It was again a DWT based transform domain method. their method, two different watermarking schemes were pro-
SVD was applied to the chosen sub-band after decomposi- posed. The first scheme was spatial domain method and the
tion. They proved that the performance of their method was other one was the transform domain technique. The schemes
better than other methods, but only ROI (region of interest) were able to recover the tampered image up to 75% and 50%
was considered for data embedding. This resulted in low tampering. In (Di Martino and Sessa 2019), a fuzzy logic
embedding capacity. based solution was proposed for image tampering detection.
Sharma et al. (2017) proposed a DCT (discrete cosine It was a non-blind technique. Another multipurpose water-
transform) and DWT based multiple watermarking scheme. marking technique was proposed in (Tiwari et al. 2017). It
Similar to the previous approach, it used an image and text was a vector quantization based approach and two different
watermarks. But in this scheme, both ROI and RONI (region watermarks were embedded in the image.
of non-interest) were utilized for embedding the water- Recently a spatial domain method with high PSNR was
mark. It used RSA (Rivest, Shamir, and Adleman) encryp- proposed by Gull et al. (2018). It was a tamper detection and
tion scheme to secure text watermark and the MD5 hashing localization technique, implemented for medical images. To
algorithm was used for image watermark. To ensure the start, the image was first divided into non-overlapping blocks
robustness of their scheme Hamming error correction codes of 4 × 4. Each block consists of 16 pixels and 16 bits were
were used. Given its complex nature, this method resulted in embedded in each block. The embedded bits were combina-
high computational complexity. There are many techniques tion of watermark and block mean. The method was based
where SVD is an important ingredient. A method proposed on bit substitution. It was a simple technique that was able
by Shehab et al. (2018) was also based on SVD. It was a to detect and localize tampering in case of general tamper-
robust-fragile technique that was able to locate the tamper ing. However, their technique failed against specific cases of
and recover the original image. Experiments show that their copy-paste attack, copy-move attack, and constant average
technique was effective against various attacks. attack. A detailed security analysis of their method is pre-
Another technique based on IWT was proposed by Sel- sented in the next section. Then after, a solution of the same
vam et al. (2017). It was a hybrid and blind watermarking is proposed in this work. Different image tampering attacks
technique implemented using DGT (discrete Gould trans- and their effects are also discussed in next section.
form). The host image was first decomposed using IWT
and high-frequency components were selected for water-
mark embedding. The selected sub-band was fragmented in 3 Image tampering attacks
blocks and DGT was applied on all blocks. Inverse DGT was
performed after embedding watermark bits. In this method In this section, different image tampering attacks has been
two transform were used. Results showed that such hybrid discussed. The performance of Gull et al. (2018) has also
methods worked better than single transforms. The downside examined for these attacks. The watermarking technique of
of this approach was that it exhibits high distortion with low (Gull et al. 2018) is explained in Fig. 1 and their perfor-
payload capacity. mance to these attack are present in Fig. 2.
A reversible watermarking scheme with high capacity A general tampering attack on an image could be a text or
was proposed by Parah et al. (2017). In their work, they an object addition. For example, a signature could be added
have applied pixel-to-block (PTB) conversion method which to the image, or a face could be replaced by another face.
guarantees reversibility. Watermark consists of EPR, and All these attacks are general tampering attacks. The image
its checksum calculated over each block. By using check- present in Fig. 2a is an example of a text addition attack.
sum, tamper detection and localization was made possible. Another basic image tampering attack, is crop-attack. In
Although reversibility was guaranteed, and high capacity crop attack, a portion of the image is removed from it. An
was achieved, the resultant images were distorted in com- example of the crop-attack is present in Fig. 2b. The copy-
parison to previous methods. paste attack is another well-known image tampering attack.
A real-time tampering detection algorithm was proposed In copy-paste attack, a part of a different watermarked
by Azeroual and Afdel (2017). It was a transform domain image, generated from the same watermarking algorithm
fragile watermarking algorithm for tamper localization. is copied on the other image. A watermarking algorithm is
Watermark was generated by the combination of a logo and expected to detect such forgery.
wavelet coefficients. In their method, Faber–Schauder dis- Another attack similar to the copy-paste attack is called
crete wavelet transform (FSDWT), was used to get the wave- a copy-move attack. This attack is sometimes called a copy-
let coefficients. The watermark was embedded in selected move forgery. In a copy-move attack, a portion from the

13
S. Bhalerao et al.

Watermark and
Fragmentation Block Mean Image
Host Image Mean
4x4 blocks Calculation Repackaging
Embedding

Watermark

XOR

Fig. 1  Watermark embedding method proposed in Gull et al. (2018)

same watermarked image is pasted on that image itself. In attack and copy-paste attack. Similarly, it is susceptible to
many methods, image mean is used as the watermark; such the constant-average attack.
methods are susceptible to constant average attack. In the In the copy-paste attack, their method fails to identify
constant-average attack, firstly an object is added or removed tampering. This happens when the part copied from the dif-
from image. Then, the average of the tampered region is ferent image has all 4 × 4 blocks intact i.e. no 4 × 4 block
computed and embedded in the tampered region itself. boundary gets violated. While pasting this block on the tam-
The watermarking technique proposed by Gull et  al. pered image, the same is taken care of, that no 4 × 4 block
(2018) was a spatial domain technique. They were using an boundary gets violated on the image. For example, 32 blocks
8-bit grayscale image of size 256 × 256 as a host image. The arranged in 8 × 4 fashion in one image, will go on 32 blocks
watermark was also an 8-bit grayscale image of size 64 × 64. of the same arrangement anywhere on the second image. It
Their embedding scheme is discussed first, followed by the does not need to be at the same location. The output for the
details of the extraction mechanism. The inherent problems copy-paste attack by Gull et al. (2018) is shown in Fig. 2c.
with this method are also discussed. Similarly, their method fails, when the copy-move attack
During the embedding phase, the host image was initially is done by preserving the boundaries of each 4 × 4 block.
divided into non-overlapping blocks of size 4 × 4. As the size The reason behind the faulty behavior of this method for
of the host image is 256 × 256; 4096 unique blocks were both attacks is the self-authentication of blocks. The aver-
created. Given the size of the watermark, the total number age value of each block is computed and is embedded in the
of pixel present in it were 4096, therefore each gray value of block itself. Thus, when the tampered region is copied from
watermark was embedded in one block. Mean (M) of each the same image (copy-move) or the different watermarked
block was calculated after replacing the LSB with zeros. image (copy-paste). The tampered-blocks self-authenticate
The calculated mean was converted into an 8-bit binary themselves and the method fails to detect tampering. But,
sequence; ceiling operation was performed, if required. Now, this happens only when attack is done by preserving block
the block was divided into two halves called the upper half boundaries. The output for the copy-move attack by Gull
block (UHB) and the lower half block (LHB). An eight-bit et al. (2018) is shown in Fig. 2d.
code was generated by XOR-ing mean (M) and 8 bits of the In the technique proposed by Gull et al. (2018) a block
watermark. After replacing LSB of every pixel the code was average can be calculated from LSBs of UHB. The constant-
embedded in LHB itself. The mean (M) was itself embedded average attack could be performed by changing the block
in UHB, by substituting LSB of every pixel of UHB. and keeping the average value of block equal to the value
In the extraction phase, a similar process was used as extracted from UHB. Alternatively, LSBs of UHB could
performed during embedding phase. The received water- be changed according to the tampered block. In both cases,
marked image was first divided into non-overlapping their method was found unable to detect image tampering. In
blocks of size 4 × 4. The last two bits of every pixel were Fig. 2e performance of their method against constant average
replaced with zeros. The block average or mean was calcu- attack is tested.
lated (ext-M). Next, the block was divided into two halves To overcome the weakness of above method an improved
UHB and LHB. The mean embedded during embedding method is proposed in this work. In the next section, the
(M) was extracted from UHB. The binary code is extracted proposed method is discussed.
from LHB and XOR-ed with the mean (M) to get the water-
mark. When ext-M was found to be same as M, no tam-
pering has been marked. The different values indicated 4 Proposed method
otherwise. Figure 2a and b shows the performance of this
method against general tampering. The method by Gull In this section, the proposed method, which is an improved
et al. (2018) is prone to the specific case of copy-move strategy against the above-mentioned attacks, is discussed.

13
A secure image watermarking for tamper detection and localization

Fig. 2  Performance of watermarking algorithm of Gull et al. (2018) against different attacks. a Text addition attack. b Crop attack. c Copy-paste
attack. d Copy move attack. e Constant average attack

In the proposed method, a key-based authentication image was 256 × 256; thus, 4096 unique blocks were cre-
scheme is implemented for image tampering detection. The ated. The key generated for every block must be same during
key-based authentication eradicates the problem present embedding and extraction, which is an important condition
in the self-authentication method. Initially, the host image for correct extraction. Therefore, block-keys were generated
was fragmented in non-overlapping blocks of 4 × 4. A 16-bit using the same seed at both ends. The complete process of
block-key was generated for each block. The watermark the watermark embedding is explained through detailed
for the block was generated using a unique block-key, that steps in the following sub-section.
helped in tamper detection of the block. The size of the host

13
S. Bhalerao et al.

(d) The hash value was computed for each stripped block,
using the SHA-1 algorithm. The first 16 bits were
extracted from the hash value. The extracted bits are
named hash-code.
(e) The hash-code was XOR-ed with 16-bit block-key and
a hash-key code was generated.
(f) The generated hash-key code was embedded in the
block itself using LSB substitution.
(g) The block generated after embedding was the water-
marked block.

The process of embedding was performed on each block


as illustrated in Fig. 3. In the Fig. 3, the original host
block is a non-overlapping block of 4 × 4 dimensions with
16 pixels. The SHA-1 hash was calculated after replacing
LSBs of every pixel with zero. The hash-key code was
generated and embedded in the block itself. After embed-
ding on every block, the image was repacked.

4.2 Extraction steps

The extraction process required for tamper detection is


explained through the following steps:

Fig. 3  Example of block embedding (a) During extraction, the fragmentation on the image was
performed again.
(b) Block-key was generated for each block with the same
4.1 Embedding steps seed used during embedding. As the seed was same for
embedding and extraction, the same key was generated
(a) The image was first divided into non-overlapping for every block as generated during embedding.
blocks of size 4 × 4. (c) The LSB’s from all 16 pixels of the blocks were
(b) A 16-bit block-key was generated for each block. As extracted, and replaced with 0. The extracted bits was
the numbers of 16-bit combinations are greater than the hash-key code embedded during the embedding phase.
total number of blocks, a unique key gets assigned to (d) The hash computation was done for each block after
each block. setting LSBs to zero.
(c) The LSB of every pixel of the block was replaced with
zero.

Fig. 4  Verification process of blocks

13
A secure image watermarking for tamper detection and localization

Fragment image in Perform SHA-1


Set LSBs of block Extract 16 bits
Host Image 4x4 non- hash on each
pixels to 0 from block hash
overlapping blocks block

16 bit block-key 16 bit hash


Generate block-
key for every block XOR

Hash-key code

Watermarked Embed hash-key


Repack Image
Image code in block LSB

(a)

Fragment image in Perform SHA-1


Watermarked Replace pixel Extract 16 bits
4x4 non- hash on each
Image LSBs to 0 from block hash
overlapping blocks block

16 bit block-key
16 bit hash
Generate block-
key for every block XOR

Hash-key code

Extract LSBs from


Hash-key code
the block pixels, it
Generated during
is the embedded
extraction
hash-key code

No
Is embedded code equal Tampering
to generated code? Detected

Yes

No Tampering
Detected

(b)

Fig. 5  Block diagram of watermarking algorithm a embedding process, b extraction process

(e) The hash-key code was generated for watermarked In Fig. 5, the complete embedding and extraction process
image blocks by XOR-ing block hash codes with block- is summarized through block diagrams. Figures 3, 4, and 5
keys. gives the comprehensive idea of proposed work. The pres-
(f) When generated code and embedded code was found to ence of 16-bit block keys makes this implementation resist-
be same, then it was markred as non- tampered block. ant to attacks discussed in the previous section. The block
keys are generated by a seed that is common during embed-
The output (embedded blocks) of Fig. 3 acts as the input ding and extraction. Until and unless this seed is known the
during extraction. Figure 4 shows the validation and veri- block-keys cannot be calculated. This makes the proposed
fication of blocks during the extraction process. Initially, improvement to perform well against attacks.
the LSBs are extracted from the block and compared with
regenerated hash-key code. It can be seen from Fig. 4 that
extracted and computed codes are equal, this implies the
absence of tampering.

13
S. Bhalerao et al.

Fig. 6  Performance of proposed method against different attacks. a Copy-move and crop attack, b copy-paste and constant-average attack

Table 1  PSNR and SSIM for common images

Lena Barbara Plane Woman

PSNR SSIM PSNR SSIM PSNR SSIM PSNR SSIM


51.1246 0.9969 51.1366 0.9977 51.1453 0.9963 51.1229 0.9957
Peppers Medical-1 Medical-2 Medical-3

PSNR SSIM PSNR SSIM PSNR SSIM PSNR SSIM


51.1391 0.9968 51.1101 0.9957 51.051 0.9905 51.203 0.9978

5 Results and discussion tamper detection method is designed to work on grayscale


images. All the tests are performed on grayscale images of
In this work, an image tamper detection and localization size 256 × 256. To test the performance, some commonly
solution is proposed. The proposed method can detect image used grayscale and medical images are used. Medical images
tampering in the presence of different types of attacks. The are taken from the same source as used in Gull et al. (2018)

13
A secure image watermarking for tamper detection and localization

To find out the effectiveness of the proposed secure and


fragile watermarking scheme, few more parameters are cal-
culated. These parameters are FPR (false positive rate), FNR
(false negative rate), and TDR (tamper detection rate).
Following are the descriptions of the above-mentioned
parameters. The FPR i.e. false-positive rate is the rate at
which the pixels that are not tampered are falsely detected
as tampered pixels:
No. of pixels falsely detected as tampered
Average FPR = × 100
No. of pixeles in tampered region

The FNR i.e. false-negative rate is the rate at which the


pixels that are tampered are falsely detected as not tampered
pixels:
No. of pixels falsely detected as untampered
Average FNR = × 100
No. of pixels in untampered region

The TDR i.e. tamper detection rate is the ratio of pix-


els which are actually tampered pixels to number of pixels
detected as tempered:
No. of detected tampered pixels
Average TDR = × 100
Actual tampered pixels

In Fig. 8, the false positive rate is plotted for different


tampering percentages. The figure shows falsely detected
pixels for random tampering, copy-paste, and copy-move
attacks. The proposed scheme is the block-based method
and even if one pixel from any block is tampered, the com-
plete block will be detected as tampered. Therefore, when
Fig. 7  Comparison of proposed method against different attacks. a
General tampering, b copy-paste attack, c copy-move attack, d con-
tampering percentage is less, the number of pixels falsely
stant average attack detected as tampered are more. Initially, the false-positive
rate is high, which quickly descends as tampering percent-
age is increased.
i.e. the OPENi medical image database. In Fig. 6, the results The FPR curves for all the three attacks are almost simi-
of the proposed algorithm, in the presence of different tam- lar, this proves that the proposed method is able to detect
pering attacks are shown. In Fig. 6a, copy-move and crop tamper equally in the presence of these attacks. The false-
attacks are done on ‘plane’ image. The proposed algorithm negative rate or FNR is always 0, as the proposed method
is able to detect and locate tampered regions quite well. In can detect 100% of tampered pixels in the presence of all
Fig. 6b, the performance of proposed work in presence of attacks. Similarly, the tampering detection rate is also 100%
copy-paste and constant average attacks are shown. as all tampered pixels are detected as tampered. In Table 2,
The well-known image quality metrics, like; SSIM (struc- the comparison of FPR, FNR, and TDR is presented for dif-
tural similarity) and PSNR (peak signal to noise ratio) are ferent attacks. A comparison of the proposed fragile water-
used to measure the watermarked image quality. In Table 1, marking method is done with some previous image tamper
SSIM and PSNR of watermarked images are presented for detection techniques in Table 3.
tested host images. A high value of PSNR and SSIM is
obtained, which is evident from Table 1. In Fig. 7, the tam-
per detection and localization ability of the proposed scheme 6 Conclusion
is compared with the method proposed in Gull et al. (2018).
Both methods are tested against similar tampering attacks. The security of multimedia signals has become a prime
The proposed scheme is found to be successful in detecting concern in this age of digital communication. Therefore,
image tampering and it outperforms the other method. in present work, a secure and fragile image watermarking

13
S. Bhalerao et al.

25

Random Tampering
Copy Move
Copy Paste

20

15
False Positive Rate

10

0
0 5 10 15 20 25 30 35 40 45 50

Tampering Percentage

Fig. 8  Average (50 images) false positive rate for different tampering percentage

Table 2  Average (50 images) Tampering per- Random tampering Copy move Copy paste
FPR, FNR and TDR for centage (%)
different tampering attacks FPR FNR TDR FPR FNR TDR FPR FNR TDR

1 20.57609 0 100 23.34487 0 100 22.40706 0 100


5 10.80332 0 100 10.77545 0 100 10.80332 0 100
10 7.526177 0 100 7.53998 0 100 7.544582 0 100
15 5.800525 0 100 6.573646 0 100 6.264667 0 100
20 5.047126 0 100 4.907751 0 100 5.781773 0 100
25 5.149985 0 100 5.021005 0 100 5.389465 0 100
30 3.93685 0 100 4.369657 0 100 4.699268 0 100
35 3.77433 0 100 3.979551 0 100 4.182124 0 100
40 3.342507 0 100 3.434532 0 100 3.246456 0 100
45 3.196016 0 100 3.636846 0 100 3.550095 0 100
50 3.342389 0 100 3.339624 0 100 3.352614 0 100

technique for image tamper detection was proposed. The tampering attacks that were copy-paste, copy-move, and
proposed technique was a block-based watermarking tech- constant average attacks. The watermarked images showed
nique using the SHA-1 hashing algorithm. Proposed tech- high quality, which was evident from their high PSNR and
nique aimed to detect and locate tamper in grayscale images. SSIM. In the future, the algorithm will be extended to incor-
The technique was able to detect tampering of all shapes porate features like robustness and self-recovery.
and sizes. The algorithm was resistant to different image

13
A secure image watermarking for tamper detection and localization

Table 3  Comparison of proposed technique with other watermarking algorithms

Method Technique Performance metrics Average Average SSIM Remarks


PSNR
(dB)

Qi and Xin (2015) Spatial domain and singular PSNR 41.39 – Complex algorithm, it was
value decomposition weak towards grometric
(SVD) attacks
Tiwari et al. (2017) Vector quantization PSNR 42 – Output (watermarked image)
PSNR was low
Azeroual and Afdel (2017) Transform domain, Faber– MSE, PSNR, FPR, FNR 51.07 – Number of false positive
Schauder DWT pixels were high
Gull et al. (2018) Spatial domain embedding PSNR, SSIM 51.14 0.9948 It was weak towards copy-
paste, copy-move and
constant average attacks
Sarkar et al. (2020) Spatial domain, quad MSE, PSNR, SSIM 44.5 0.9993 Output (watermarked image)
method PSNR was low
Proposed Spatial domain, hash-based PSNR, SSIM 51.12 0.9959 Detects copy-paste, copy-
embedding move and constant average
attacks

References Khamlichi YI, Zaz Y, Afdel K (2006) Authentication system for medi-
cal watermarked content based image. Wseas Trans Signal Pro-
cess 5:826–830
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steg-
Khan F, Gutub AA-A (2007) Message concealment techniques using
anography using truth table based and determinate array on RGB
image based steganography. In: 4th IEEE GCC Conf Exhib 5
indicator. Int J Signal Image Process 1:9
Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD et al
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible water-
(2019) Digital watermarking techniques for image security: a
marking in integer wavelet domain for medical images. J Syst
review. J Amb Intell Humaniz Comput. https​://doi.org/10.1007/
Softw 85:883–894
s1265​2-019-01500​-1
Azeroual A, Afdel K (2017) Real-time image tamper localization
Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking
based on fragile watermarking and Faber-Schauder wave-
techniques used in medical images: a survey. J Digit Imaging
let. AEU Int J Electron Commun 79:207–218. https​: //doi.
27:714–729
org/10.1016/j.aeue.2017.06.001
Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical infor-
Di Martino F, Sessa S (2019) Fragile watermarking tamper
mation in medical images: a new high capacity and reversible data
detection via bilinear fuzzy relation equations. J Amb Intell
hiding technique. J Biomed Inform 66:214–230
Humaniz Comput 10:2041–2061. https​://doi.org/10.1007/s1265​
Parvez MT, Gutub AAA (2008) RGB intensity based variable-bits
2-018-0806-3
image steganography. In: Proc 3rd IEEE Asia-Pacific Serv Com-
Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital
put Conf APSCC 2008, pp 1322–1327. https​://doi.org/10.1109/
watermarking in telemedicine applications-towards enhanced
APSCC​.2008.105
data security and accessibility. In: 2006 International confer-
Parvez MT, Gutub AA-A (2011) Vibrant color image steganography
ence of the IEEE engineering in medicine and biology society.
using channel differences and secret data distribution. Kuwait J
pp 6328–6331
Sci Eng 38:127–142
Gull S, Loan NA, Parah SA et al (2018) An efficient watermarking
Potdar VM, Han S, Chang E (2005) A survey of digital image water-
technique for tamper detection and localization of medical images.
marking techniques. In: INDIN’05. 2005 3rd IEEE international
J Amb Intell Humaniz Comput 1–10
conference on industrial informatics, 2005. pp 709–716
Gutub AA-A (2010) Pixel indicator technique for RGB image steg-
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking
anography. J Emerg Technol Web Intell 2:56–64
scheme for image content authentication with tamper localization.
Gutub A, Al-Qahtani A (2009) Triple-A: secure RGB image steganog-
J Vis Commun Image Represent 30:312–327
raphy based on randomization. IEEE/ACS Int Conf Comput Syst
Rao NV, Kumari VM (2011) Watermarking in medical imaging for
Appl AICCSA 2009:400–403. https​://doi.org/10.1109/AICCS​
security and authentication. Inf Secur J Glob Perspect 20:148–155
A.2009.50693​56
Rey C, Dugelay J-L (2002) A survey of watermarking algorithms
Gutub A, Al-juaid N (2018) Multi-bits stego-system for hiding text
for image authentication. EURASIP J Adv Signal Process
in multimedia images based on user security priority. J Comput
2002:218932
Hardw Eng 1:1–9. https​://doi.org/10.63019​/jche.v1i2.513
Sarkar D, Palit S, Som S, Dey KN (2020) Large scale image tam-
Gutub A, Ankeer M, Abu-Ghalioun M, et al (2008) Pixel indicator high
per detection and restoration. Multimed Tools Appl. https​://doi.
capacity technique for RGB image based steganography
org/10.1007/s1104​2-020-08669​-0
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing
Selvam P, Balachandran S, Iyer SP, Jayabal R (2017) Hybrid transform
technique for multimedia applications. Multimed Tools Appl
based reversible watermarking technique for medical images in
78:5591–5619. https​://doi.org/10.1007/s1104​2-017-5293-6
telemedicine applications. Optik 145:655–671

13
S. Bhalerao et al.

Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multi- Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image
ple watermarking for medical images. Wirel Pers Commun authentication and tamper detection algorithm using vector quan-
92:1611–1624 tization approach. AEU Int J Electron Commun 78:114–123. https​
Shehab A, Elhoseny M, Muhammad K et al (2018) Secure and robust ://doi.org/10.1016/j.aeue.2017.05.027
fragile watermarking scheme for medical images. IEEE Access Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image water-
6:10269–10278 marking with variable watermark capacity. Appl Sci 8:548
Singh SP, Bhatnagar G (2019) A robust blind watermarking framework Zain J, Clarke M (2005) Security in telemedicine: issues in watermark-
based on Dn structure. J Amb Intell Humaniz Comput 11:1869– ing medical images. In: Sci Electron Technol Inf Telecommun
1887. https​://doi.org/10.1007/s1265​2-019-01296​-0 Tunis
Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and impercepti-
ble spread-spectrum watermarking for telemedicine applications. Publisher’s Note Springer Nature remains neutral with regard to
Proc Natl Acad Sci India Sect A Phys Sci 85:295–301 jurisdictional claims in published maps and institutional affiliations.
Tan CK, Ng JC, Xu X et al (2011) Security protection of DICOM medi-
cal images using dual-layer reversible watermarking with tamper
detection capability. J Digit Imaging 24:528–540
Thakkar FN, Srivastava VK (2017) A blind medical image watermark-
ing: DWT-SVD based robust and secure approach for telemedi-
cine applications. Multimed Tools Appl 76:3669–3697. https​://
doi.org/10.1007/s1104​2-016-3928-7

13

You might also like