Skip to main content
Log in

A secure image watermarking for tamper detection and localization

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Data security has become a major concern of present time. Digital image watermarking is seen as a viable solution to ensure the integrity of image data. Watermarking algorithms can detect the presence of various attacks on images. In this work, a secure and efficient fragile image watermarking technique is proposed. The proposed watermarking algorithm aims to find image tampering and its location. The proposed approch is a spatial domain, block-based embedding technique. It introduces a unique key based embedding using SHA-1 (Secure Hashing Algorithm) hashing. The watermarked images have high PSNR and SSIM. The algorithm can handle various size of tampering, from very small to large. The proposed technique has been tested for a wide variety of tampering attacks like copy-paste, copy-move, constant average, and general tampering. It can efficiently detect tampering in the presence of these attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process 1:9

    Google Scholar 

  • Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894

    Article  Google Scholar 

  • Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU Int J Electron Commun 79:207–218. https://doi.org/10.1016/j.aeue.2017.06.001

    Article  Google Scholar 

  • Di Martino F, Sessa S (2019) Fragile watermarking tamper detection via bilinear fuzzy relation equations. J Amb Intell Humaniz Comput 10:2041–2061. https://doi.org/10.1007/s12652-018-0806-3

    Article  Google Scholar 

  • Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications-towards enhanced data security and accessibility. In: 2006 International conference of the IEEE engineering in medicine and biology society. pp 6328–6331

  • Gull S, Loan NA, Parah SA et al (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Amb Intell Humaniz Comput 1–10

  • Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell 2:56–64

    Google Scholar 

  • Gutub A, Al-Qahtani A (2009) Triple-A: secure RGB image steganography based on randomization. IEEE/ACS Int Conf Comput Syst Appl AICCSA 2009:400–403. https://doi.org/10.1109/AICCSA.2009.5069356

    Article  Google Scholar 

  • Gutub A, Al-juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng 1:1–9. https://doi.org/10.63019/jche.v1i2.513

    Article  Google Scholar 

  • Gutub A, Ankeer M, Abu-Ghalioun M, et al (2008) Pixel indicator high capacity technique for RGB image based steganography

  • Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591–5619. https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  • Khamlichi YI, Zaz Y, Afdel K (2006) Authentication system for medical watermarked content based image. Wseas Trans Signal Process 5:826–830

    Google Scholar 

  • Khan F, Gutub AA-A (2007) Message concealment techniques using image based steganography. In: 4th IEEE GCC Conf Exhib 5

  • Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD et al (2019) Digital watermarking techniques for image security: a review. J Amb Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01500-1

    Article  Google Scholar 

  • Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27:714–729

    Article  Google Scholar 

  • Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230

    Article  Google Scholar 

  • Parvez MT, Gutub AAA (2008) RGB intensity based variable-bits image steganography. In: Proc 3rd IEEE Asia-Pacific Serv Comput Conf APSCC 2008, pp 1322–1327. https://doi.org/10.1109/APSCC.2008.105

  • Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142

    Google Scholar 

  • Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: INDIN’05. 2005 3rd IEEE international conference on industrial informatics, 2005. pp 709–716

  • Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327

    Article  Google Scholar 

  • Rao NV, Kumari VM (2011) Watermarking in medical imaging for security and authentication. Inf Secur J Glob Perspect 20:148–155

    Article  Google Scholar 

  • Rey C, Dugelay J-L (2002) A survey of watermarking algorithms for image authentication. EURASIP J Adv Signal Process 2002:218932

    Article  Google Scholar 

  • Sarkar D, Palit S, Som S, Dey KN (2020) Large scale image tamper detection and restoration. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08669-0

    Article  Google Scholar 

  • Selvam P, Balachandran S, Iyer SP, Jayabal R (2017) Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik 145:655–671

    Article  Google Scholar 

  • Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92:1611–1624

    Article  Google Scholar 

  • Shehab A, Elhoseny M, Muhammad K et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  • Singh SP, Bhatnagar G (2019) A robust blind watermarking framework based on Dn structure. J Amb Intell Humaniz Comput 11:1869–1887. https://doi.org/10.1007/s12652-019-01296-0

    Article  Google Scholar 

  • Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proc Natl Acad Sci India Sect A Phys Sci 85:295–301

    Article  Google Scholar 

  • Tan CK, Ng JC, Xu X et al (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24:528–540

    Article  Google Scholar 

  • Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669–3697. https://doi.org/10.1007/s11042-016-3928-7

    Article  Google Scholar 

  • Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU Int J Electron Commun 78:114–123. https://doi.org/10.1016/j.aeue.2017.05.027

    Article  Google Scholar 

  • Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image watermarking with variable watermark capacity. Appl Sci 8:548

    Article  Google Scholar 

  • Zain J, Clarke M (2005) Security in telemedicine: issues in watermarking medical images. In: Sci Electron Technol Inf Telecommun Tunis

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irshad Ahmad Ansari.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhalerao, S., Ansari, I.A. & Kumar, A. A secure image watermarking for tamper detection and localization. J Ambient Intell Human Comput 12, 1057–1068 (2021). https://doi.org/10.1007/s12652-020-02135-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02135-3

Keywords

Navigation