A Robust Watermark-based Model for Image Content Integrity Verification and Tampering Detection

Jayanti Rout, Sangram Pati, Minati Mishra

Abstract


The rise of digital image tampering has increased the inability to check authenticity of images. This has
made its identification as well as the localization the tampered regions a significant challenge. Watermarkbased content authentication methods provides an effective solution to it. This study proposes a strong and reliable watermark-based authentication algorithm. It uses two watermarks that are created using the Haar wavelet transform, discrete cosine transform, and singular value decomposition. A tamper detection mask is also used to highlight the tampered regions of the image. The embedded watermarks were observed to resist various attacks, including compression, cropping, noise addition, and blurring. This highlights the robustness of the approach. The experimental evaluations show that the proposed method achieves high imperceptibility with various near-ideal metrics. It achieved Peak Signal-to-Noise Ratio (PSNR) values > 38 dB, Structural Similarity Index Measure (SSIM) > 99%, and Normalized Cross-Correlation (NCC)
of ∼99.8%. The method effectively detects various types of manipulation and attacks in images. The proposed technique shows strong applicability in various domains, including digital forensics, copyright enforcement, and the protection of sensitive multimedia contents.


Full Text:

PDF

References


D. Emery, “The museum of hoaxes - photo database.” https://hoaxes.org/photo_database/chronological, 2024. [Accessed: 2024-05-03].

National Geographic, “Political photo manipulation in history,” 2023. Accessed: 2024-05-30.

I. T. Staff, “Rajnath singh slams fake image of him with ex-dgp of gujarat shared by congress’s sanjay jha.” https://www.indiatoday.in/fyi/story/rajnath-singh-fake-image-dgp-guj

arat-congress-sanjay-jha-1078093/-2017-1 1-01, 2017. [Accessed: 2024-05-04].

S. Bourouis, R. Alroobaea, A. M. Alharbi, M. An dejany, and S. Rubaiee, “Recent advances in digital multimedia tampering detection for forensics analysis,” Symmetry, vol. 12, no. 11, p. 1811, 2020.

K. B. Meena and V. Tyagi, “Image forgery detection: survey and future directions,” Data, Engineering and Applications: Volume 2, pp. 163–194,

G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A survey,” Digital investigation, vol. 10, no. 3, pp. 226–245, 2013.

M. D. Ansari, S. P. Ghrera, and V. Tyagi, “Pixel-based image forgery detection: A review,” IETE journal of education, vol. 55, no. 1, pp. 40–46,2014.

A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” 2004.

W. Luo, J. Huang, and G. Qiu, “Robust detection of region-duplication forgery in digital image,” in 18th International Conference on Pattern Recognition (ICPR’06), vol. 4, pp. 746–749, IEEE, 2006.

E. A. A. Vega, E. G. Fern´andez, A. L. S. Orozco, and L. J. G. Villalba, “Passive image forgery detection based on the demosaicing algorithm and jpeg compression,” IEEE Access, vol. 8, pp. 11815–11823, 2020.

S. Farooq, M. H. Yousaf, and F. Hussain, “A generic passive image forgery detection scheme using local binary pattern with rich models,”

Computers & Electrical Engineering, vol. 62, pp. 459–472, 2017.

S. Panda and M. Mishra, “Passive techniques of digital image forgery detection: developments and challenges,” in Advances in Electronics, Communication and Computing: ETAEERE-2016,

pp. 281–290, Springer, 2018.

S. K. Raj, B. S. Mohanty, J. Rout, A. Soni, and S. K. Nanda, “An automated deep learning model for detecting image forgeries,” in 2024 International Conference on Electrical Electronics and

Computing Technologies (ICEECT), vol. 1, pp. 1–6, 2024.

J. Fridrich, “Image watermarking for tamper detection,” in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), vol. 2, pp. 404–408, IEEE, 1998.

M. Begum and M. S. Uddin, “Digital image watermarking techniques: a review,” Information, vol. 11, no. 2, p. 110, 2020.

S. K. Behera and M. Mishra, “Steganography–a game of hide and seek in information communication,” arXiv preprint arXiv:1604.00493, 2016.

G. L. Friedman, “The trustworthy digital camera: Restoring credibility to the photographic image,” IEEE Transactions on consumer electronics, vol. 39, no. 4, pp. 905–910, 1993.

S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications,” IEEE Journal on Selected areas in Communications, vol. 16, no. 4, pp. 573–586, 1998.

M. M. Yeung and F. C. Mintzer, “Invisible water marking for image verification,” Journal of Electronic imaging, vol. 7, no. 3, pp. 578–591, 1998.

F. Mintzer and G. W. Braudaway, “If one watermark is good, are more better?,” in 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99

(Cat. No. 99CH36258), vol. 4, pp. 2067–2069, IEEE, 1999.

M. S. D. Mashalkar and S. Shirgan, “Design of watermarking scheme in medical image authentication using dwt and svd technique,” in 2017 International Conference on Computing Method-

ologies and Communication (ICCMC), pp. 955–960, IEEE, 2017.

S. M. Alessio and S. M. Alessio, “Discrete wavelet transform (dwt),” Digital signal processing and spectral analysis for scientists: concepts and applications, pp. 645–714, 2016.

D. Zhang and D. Zhang, “Wavelet transform,” Fundamentals of image data mining: Analysis, Features, Classification and Retrieval, pp. 35–44, 2019.

M. M. H. Chowdhury and A. Khatun, “Image compression using discrete wavelet transform,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 4, p. 327, 2012.

H. Prasantha, H. Shashidhara, and K. B. Murthy, “Image compression using svd,” in International conference on computational intelligence and multimedia applications (ICCIMA 2007), vol. 3,

pp. 143–145, IEEE, 2007.

S. M. Arora et al., “A dwt-svd based robust digital watermarking for digital images,” Procedia computer science, vol. 132, pp. 1441–1448, 2018.

N. Zermi, A. Khaldi, R. Kafi, F. Kahlessenane, and S. Euschi, “A dwt-svd based robust digital watermarking for medical image security,” Forensic science international, vol. 320, p. 110691,

D. Mata-Mendoza, M. Cedillo-Hernandez, F. Garcia-Ugalde, A. Cedillo-Hernandez, M. Nakano-Miyatake, and H. Perez-Meana,

“Secured telemedicine of medical imaging based on dual robust watermarking,” The Visual Computer, vol. 38, no. 6, pp. 2073–2090, 2022.

B. Mokashi, V. S. Bhat, J. D. Pujari, S. Roopashree, T. Mahesh, and D. S. Alex, “Efficient hybrid blind watermarking in dwt-dct-svd

with dual biometric features for images,” Contrast Media & Molecular Imaging, vol. 2022, no. 1, p. 2918126, 2022.

S. S. Rajput, B. Mondal, and F. Q. Warsi, “A robust watermarking scheme via optimization- based image reconstruction technique,” Multimedia Tools and Applications, vol. 82, no. 16, pp. 25039–25060, 2023.

R. Hu, J. Zhang, T. Zhang, and J. Li, “Robust-wide: Robust watermarking against instruction-driven image editing,” arXiv preprint

arXiv:2402.12688, 2024.

W.-C. Hu, W.-H. Chen, D.-Y. Huang, and C.-Y. Yang, “Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes,” Multimedia Tools and Applications, vol. 75, pp. 3495–3516, 2016.

T.-S. Nguyen, “Fragile watermarking for image authentication based on dwt-svd-dct techniques,” Multimedia Tools and Applications, vol. 80, no. 16, pp. 25107–25119, 2021.

M. Z. Salim, A. J. Abboud, and R. Yildirim, “A visual cryptography-based watermarking approach for the detection and localization of image forgery,” Electronics, vol. 11, no. 1, p. 136, 2022.

C.-C. Lin, T.-L. Lee, Y.-F. Chang, P.-F. Shiu, and B. Zhang, “Fragile watermarking for tamper localization and self-recovery based on ambtc and vq,” Electronics, vol. 12, no. 2, p. 415, 2023.

C. Zhan, L. Leng, C.-C. Chang, and J.-H. Horng, “Reversible image fragile watermarking with dual tampering detection,” Electronics, vol. 13, no. 10, p. 1884, 2024.

USC-SIPI, “Usc-sipi image database.” https://sipi.usc.edu/database/, 2024. [Accessed: 2024-06-03].

E. Hemdan, N. El Fishawy, G. Attiya, and F. El- Samie, “An efficient image watermarking approach based on wavelet fusion and singular value decomposition in wavelet domain,” in Proceeding of 3rd International Conference on Advanced Control Circuits And Systems (ACCS’013), no. 1-10, 2013.




DOI: https://doi.org/10.31449/inf.v49i28.9176

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.