Skip to main content
Log in

Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The increasing performances of personal computers, as well as software of image processing, enable the easy manipulation of digital media content. Unfortunately, this easy manipulation makes the detection of changes in the multimedia content a very difficult task. Digital watermarking is among the most appropriate techniques to verify the integrity of multimedia content. In this paper, we propose a semi-fragile watermarking scheme for JPEG2000 image self-authentication that ensuring the robustness of the watermark against the compression attacks generated by the JPEG2000 encoder itself. The scheme is combined with the JPEG2000 encoder by embedding the generated watermark into the host image during the JPEG2000 compression process. To generate the watermark we suppose to use a perceptual hash function (PHF) operating on discrete wavelet coefficients of the host image. The proposed watermark generation process leads the system to verify the integrity of the image without the need to any file except for the watermarked image. The watermark is embedded during the JPEG2000 compression process after Discrete Wavelet Transform (DWT) step into the approximation sub-band coefficients of the five wavelet decomposition using Index Modulation Quantification (QIM), and can be extracted during image decoding. To prove the authentication of the image, the system compares the extracted watermark with the new watermark generated from the received image. Experimental results show that our proposed approach has not only an extremely high accuracy of tampering detection but also a relatively very high resistance against JPEG2000 compression attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ahmad I, Millie A, Chang P, Ahn W (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics

  2. Boneh D, Shoup V (2015) A graduate course in applied cryptography

  3. Bourgeois J, Michel P, Raska S, Rubio B, Erra R (2004) Watermarking. Cours

  4. Cachin C (2005) Digital steganography. Encyclopedia of Cryptography and Security, pp 1–7

  5. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2006) Special issue on steganography and digital watermarking. Network 153(3):2005–2006

    Google Scholar 

  6. Djebbar F, Abed-Meraim K, Guerchi D, Hamam H (2010) Dynamic energy based text-in-speech spectrum hiding using speech masking properties. In: 2010 the 2nd international conference on industrial mechatronics and automation. [Online]. Available: http://ieeexplore.ieee.org/document/5538279/. IEEE, pp 422–426

  7. Djebbar F, Ayad B, Abed-Meraim K, Hamam H (2013) Unified phase and magnitude speech spectra data hiding algorithm. Security and Communication Networks 6(8). [Online]. Available: https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.644

  8. Djebbar F, Ayad B, Hamam H, Abed-Meraim K (2011) A view on latest audio steganography techniques. In: 2011 international conference on innovations in information technology. [Online]. Available: http://ieeexplore.ieee.org/document/5893859/. IEEE, pp 409–414

  9. Djebbar F, Hamam H, Abed-Meraim K, Guerchi D (2010) Controlled distortion for high capacity data-in-speech spectrum steganography. In: 2010 sixth international conference on intelligent information hiding and multimedia signal processing. [Online]. Available: http://ieeexplore.ieee.org/document/5638013/. IEEE, pp 212–215

  10. Hamam H (2010) Digital holography-based steganography. Opt Lett 35(24):4175. [Online]. Available: https://www.osapublishing.org/abstract.cfm?URI=ol-35-24-4175

    Article  Google Scholar 

  11. Kozat SS, Venkatesan R, Kivanç Mihçak M (2004) ROBUST perceptual image hashing via matrix invariants. In: Proceedings of the IEEE international conference on image processing (ICIP’04), pp 3443–3446

  12. Leng L, Jin A (2015) Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn 48(7):2290–2303. [Online]. Available: https://doi.org/10.1016/j.patcog.2015.01.021

    Article  Google Scholar 

  13. Leng L, Li M, Kim C, Bi X (2015) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimedia Tools and Applications. [Online]. Available: https://doi.org/10.1007/s11042-015-3058-7

  14. Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34 (6):1979–1989. [Online]. Available: https://doi.org/10.1016/j.jnca.2011.07.003

    Article  Google Scholar 

  15. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of Physical Sciences 5(17):2543–2554

    Google Scholar 

  16. Li Z, Zhu X, Lian Y, Sun Q (2007) Constructing secure content-dependent watermarking scheme using homomorphic encryption. In: 2007 IEEE international conference on multimedia and expo. [Online]. Available: http://ieeexplore.ieee.org/document/4284728/. IEEE, pp 627–630

  17. Lin C-Y, Chang S-F (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of the SPIE security and watermarking of multimedia contents II, San Jose, CA, USA, pp 140–151

  18. Meerwald P (2001) Quantization watermarking in the JPEG2000 coding pipeline

  19. Moussa S, Razik AMA, Dahmane AO, Hamam H (2013) FPGA implementation platform for MIMO-OFDM based on UART

  20. Ntantogian C, Malliaros S, Xenakis C (2019) Evaluation of password hashing schemes in open source web platforms. Computers and Security 84:206–224. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404818308332

    Article  Google Scholar 

  21. Oriyano S-P, Tanna JM, Sanghani MP, Ayushi M, Anderson RJ (2010) A symmetric key cryptographic algorithm. International Journal of Computer Applications 1(15):73–114

    Google Scholar 

  22. Peng C, Deng R, Wu Y (2003) A flexible and scalable authentication scheme for JPEG2000 image codestreams MM’03

  23. Poornima R, Iswarya RJ (2013) An overview of digital image steganography. International Journal of Computer Science and Engineering Survey 4(1):23–31

    Article  Google Scholar 

  24. Prasad K, Aithal PS, History A (2018) ABCD analysis of fingerprint hash code, password and OTP based multifactor authentication model. Saudi Journal of Business and Management Studies (SJBMS). [Online]. Available: http://scholarsmepub.com/sjbms/Website:http://scholarsmepub.com/

  25. Preneel B (1999) The state of cryptographic hash functions, Tech. Rep. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.87.9777&rep=rep1&type=pdf

  26. Rekik HHS, Guerchi D, Selouani S (2012) Audio steganography coding using the discrete wavelet transforms. International Journal of Computer Science and Security (IJCSS) 6(1):79–93

    Google Scholar 

  27. Rhayma H, Makhloufi A, Hamam H, Hamida AB (2019) Semi-fragile self-recovery watermarking scheme based on data representation through combination. Multimedia Tools and Applications, pp 1–23. [Online]. Available: http://link.springer.com/10.1007/s11042-019-7244-x

  28. Rhayma H, Makhloufi A, Hamam H, Hmida AB (2018) Semi fragile watermarking scheme for image recovery in wavelet domain. IEEE-ATSIP. ISBN: 978-1-5386-5239-8/18, no. 24–28

  29. Sawda RE, Alfalou A, Hamam H (2007) RGB colored image encryption processes using several colored keys images. In: Future generation communication and networking (FGCN 2007). IEEE, pp 594–598. [Online]. Available: http://ieeexplore.ieee.org/document/4426312/

  30. Schlauweg M, Pröfrock D, Müller E (2006) JPEG2000-based secure image authentication, Tech Rep.

  31. Schneider M, Chang S-F (1996) A robust content based digital signature for image authentication. In: Proceedings of the IEEE international conference on image processing (ICIP’96), vol 3, pp 227–230

  32. Singh A, Loar R (2018) Web security and enhancement using SSL. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 3(4). [Online]. Available: http://ijsrcseit.com

  33. Sun Q, Chang S-F, Kurato M, Suto M (2002) A quantitive semi-fragile JPEG2000 image authentication system, Tech Rep.

  34. Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU - International Journal of Electronics and Communications 78:114–123

    Article  Google Scholar 

  35. Wang Z, Bovik AC, Sheikh HR, Member S, Simoncelli EP, Member S (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):1–14

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanen Rhayma.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rhayma, H., Makhloufi, A., Hamam, H. et al. Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection. Multimed Tools Appl 80, 26813–26832 (2021). https://doi.org/10.1007/s11042-021-10886-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10886-0

Keywords

Navigation