Skip to main content
Log in

A novel tamper detection watermarking approach for improving image integrity

  • 1225: Sentient Multimedia Systems and Universal Visual Languages
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Internet use has become a staple of our lives to transfer data. Although anyone can alter or modify these data, as image modifying tools are readily available. The slightest change in the medical image can lead to a wrong diagnosis, and the vital goal is not achieved. Tamper detection has been proposed as a solution for ensuring the integrity and authenticity of digital images. The goal is to identify and pinpoint any image changes that have taken place after transmission. An innovative watermarking technique is presented in this paper for detecting tampering. The approach relies on the Code Division Multiple Access (CDMA) technique. In order to generate the Common Code (watermark) data, the blocks must be encoded, followed by a Walsh table. This embedding process occurs in the LSB of each block. During the semi-blind detection step, the encode (data representation) matrix is necessary during the verification and detection steps. The proposed approach evaluated various types of attacks and tampered processes. According to the results of the experiments, the proposed approach outperforms existing and related approaches in terms of quality, imperceptibility, capacity, and tamper detection. The proposed method is evaluated using the Stirmark benchmark and CASIA v2 dataset. The approach provides a high quality and there is no degradation after embedding the watermark in the original image. Also, the watermarked approach is imperceptible where the PSNR is 56.4 dB and the SSIM is 0.9983, it consumes less space in the original image, its bPP is 0.85. In addition, it requires less computational resources than other approaches with an embedding and extraction time of 3.798 s. Further, the detection performance of the tampered data is 99.965. In addition, the approach provides promising results against spliced tampering, with an average F1 score of 0.8969.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 1–16

  2. AlShaikh M, Laouamer L, Nana L, Pascu A (2016) A novel CT scan images watermarking scheme in DWT transform coefficients. IJCSNS 16(1):62

    Google Scholar 

  3. AlShaikh M, Nana L, Laouamer L, Christine A (2016) Formal concept analysis to improve robustness on medical image watermarking schemes in the spatial domain. Int J Comput Sci Inf Secur 14(2):261

    Google Scholar 

  4. AlShaikh M, Laouamer L, Nana L, Pascu AC (2017) Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76(6):8937–8950

    Article  Google Scholar 

  5. AlShaikh M, Laouamer L, Laouid A, Bounceur A, Hammoudeh M (2019) Robust and imperceptible medical image watermarking based on dijkstra algorithm. In: Proceedings of the 3rd international conference on future networks and distributed systems, pp 1–6

  6. Bahrami K, Kot AC, Li L, Li H (2015) Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur 10(5):999–1009

    Article  Google Scholar 

  7. Barani MJ, Valandar MY, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205–222

    Article  Google Scholar 

  8. Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Appl 75(14):8695–8718

    Article  Google Scholar 

  9. Bikov D, Bouyukliev I (2018) Parallel fast Walsh transform algorithm and its implementation with CUDA on GPUs. Cybern Inf Technol 18(5):21–43

    MathSciNet  Google Scholar 

  10. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446

    Article  Google Scholar 

  11. Chang JD, Chen BH, Tsai CS (2013). LBP-based fragile watermarking scheme for image tamper detection and recovery. In: 2013 international symposium on next-generation electronics. IEEE, pp 173–176

  12. Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307

    Article  Google Scholar 

  13. Chen TS, Hou KN, Beh WK, Wu AY (2019) Low-complexity compressed-sensing-based watermark cryptosystem and circuits implementation for wireless sensor networks. EEE Trans Very Large Scale Integr Syst 27(11):2485–2497

    Article  Google Scholar 

  14. Cheraghchi M, Indyk P (2017) Nearly optimal deterministic algorithm for sparse Walsh-Hadamard transform. ACM Trans Algorithms 13(3):1–36

    Article  MathSciNet  MATH  Google Scholar 

  15. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841–1854

    Article  Google Scholar 

  16. Dadkhah S, Abd Manaf A, Hori Y, Hassanien AE, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210

    Article  Google Scholar 

  17. Dong J, Wang W, Tan T (2013). Casia image tampering detection evaluation database. In: 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, pp 422–426

  18. Faragallah OS (2018) Secure audio cryptosystem using hashed image LSB watermarking and encryption. Wireless Pers Commun 98(2):2009–2023

    Article  Google Scholar 

  19. Farid, H. (1999). Detecting digital forgeries using bispectral analysis.

  20. Farid H (2017) How to detect faked photos. Am Sci 3

  21. Haghighi BB, Taherinia AH, Mohajerzadeh AH (2019) TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf Sci 486:204–230

    Article  Google Scholar 

  22. Hsu CS, Tu SF (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296

    Article  Google Scholar 

  23. Hsu YF, Chang SF (2010) Camera response functions for image forensics: an automatic algorithm for splicing detection. IEEE Trans Inf Forensics Secur 5(4):816–825

    Article  Google Scholar 

  24. Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digit Ecosyst 2(1–2):1–12

    Google Scholar 

  25. Liu Y, Xiang L, Yang LL, Hanzo L (2021) Space-time coded generalized spatial modulation for sparse code division multiple access. IEEE Trans Wirel Commun

  26. Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher order statistics. In: 2004 IEEE international symposium on circuits and systems (IEEE Cat. No. 04CH37512), vol 5. IEEE, pp V-V

  27. Nguyen AH, Pickering MR, Lambert A (2016) The FPGA implementation of a one-bit-per-pixel image registration algorithm. J Real-Time Image Proc 11(4):799–815

    Article  Google Scholar 

  28. Park TH, Han JG, Moon YH, Eom IK (2016) Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain. EURASIP J Image Video Process 2016(1):1–10

    Article  Google Scholar 

  29. Park CS, Kim C, Lee J, Kwon GR (2016) Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection. Multimed Tools Appl 75(23):16577–16595

    Article  Google Scholar 

  30. Park CS, Choeh JY (2018) Fast and robust copy-move forgery detection based on scale-space representation. Multimed Tools Appl 77(13):16795–16811

    Article  Google Scholar 

  31. Pham NT, Lee JW, Kwon GR, Park CS (2019) Hybrid image-retrieval method for image-splicing validation. Symmetry 11(1):83

    Article  Google Scholar 

  32. Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79(3):1673–1705

    Article  Google Scholar 

  33. Prucnal PR (Ed) (2018) Optical code division multiple access: fundamentals and applications. CRC press

  34. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6

  35. Robles A, Norris J, Watson S, Browne AF (2018) Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits. In: SoutheastCon 2018. IEEE, pp 1–5

  36. Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron Commun 72:149–161

    Article  Google Scholar 

  37. Roy D, Sengupta A (2017) Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesis. Futur Gener Comput Syst 71:89–101

    Article  Google Scholar 

  38. Sara U, Akter M, Uddin MS (2019) Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study. J Comput Commun 7(3):8–18

    Article  Google Scholar 

  39. Sharma S, Zou JJ, Fang G (2020) A novel signature watermarking scheme for identity protection. In: 2020 Digital Image Computing: Techniques and Applications (DICTA). IEEE, pp 1–5

  40. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  41. Singh RK, Shaw DK, Alam MJ (2015) Experimental studies of LSB watermarking with different noise. Procedia Comput Sci 54:612–620

    Article  Google Scholar 

  42. Singhal S, Ranga V (2021) Passive authentication image forgery detection using multilayer cnn. In: Mobile Radio Communications and 5G Networks. Springer, Singapore, pp 237–249

  43. Sun XC, Lu ZM, Wang Z, Liu YL (2021) A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT. Multimed Tools Appl 80(9):13491–13511

    Article  Google Scholar 

  44. Teng L, Wang X, Wang X (2013) Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int J Electron Commun 67(6):540–547

    Article  Google Scholar 

  45. Ulutas G, Ustubioglu A, Ustubioglu B, Nabiyev VV, Ulutas M (2017) Medical image tamper detection based on passive image authentication. J Digit Imaging 30(6):695–709

    Article  Google Scholar 

  46. Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: Towards a second generation watermarking benchmark. Signal Process 81(6):1177–1214

    Article  MATH  Google Scholar 

  47. Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), vol 1). IEEE, pp 455–459.

  48. Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458

    Article  Google Scholar 

  49. Zhang H, Wang C, Zhou X (2017) Fragile watermarking based on LBP for blind tamper detection in images. J Inf Process Syst 13(2):385–399

    Google Scholar 

  50. Zheng Y, Cao Y, Chang CH (2019) A PUF-based data-device hash for tampered image detection and source camera identification. IEEE Trans Inf Forensics Secur 15:620–634

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muath AlShaikh.

Ethics declarations

The author certifies that he has NO affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers’ bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non-financial interest (such as personal or professional relationships, affiliations, knowledge or beliefs) in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

AlShaikh, M. A novel tamper detection watermarking approach for improving image integrity. Multimed Tools Appl 82, 10039–10060 (2023). https://doi.org/10.1007/s11042-021-11840-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11840-w

Keywords

Navigation