A Robust Watermark-based Model for Image Content Integrity Verification and Tampering Detection
Abstract
The rise of digital image tampering has increased the inability to check authenticity of images. This hasmade its identification as well as the localization the tampered regions a significant challenge. Watermarkbased content authentication methods provides an effective solution to it. This study proposes a strong and reliable watermark-based authentication algorithm. It uses two watermarks that are created using the Haar wavelet transform, discrete cosine transform, and singular value decomposition. A tamper detection mask is also used to highlight the tampered regions of the image. The embedded watermarks were observed to resist various attacks, including compression, cropping, noise addition, and blurring. This highlights the robustness of the approach. The experimental evaluations show that the proposed method achieves high imperceptibility with various near-ideal metrics. It achieved Peak Signal-to-Noise Ratio (PSNR) values > 38 dB, Structural Similarity Index Measure (SSIM) > 99%, and Normalized Cross-Correlation (NCC)of ∼99.8%. The method effectively detects various types of manipulation and attacks in images. The proposed technique shows strong applicability in various domains, including digital forensics, copyright enforcement, and the protection of sensitive multimedia contents.References
D. Emery, “The museum of hoaxes - photo database.” https://hoaxes.org/photo_database/chronological, 2024. [Accessed: 2024-05-03].
National Geographic, “Political photo manipulation in history,” 2023. Accessed: 2024-05-30.
I. T. Staff, “Rajnath singh slams fake image of him with ex-dgp of gujarat shared by congress’s sanjay jha.” https://www.indiatoday.in/fyi/story/rajnath-singh-fake-image-dgp-guj
arat-congress-sanjay-jha-1078093/-2017-1 1-01, 2017. [Accessed: 2024-05-04].
S. Bourouis, R. Alroobaea, A. M. Alharbi, M. An dejany, and S. Rubaiee, “Recent advances in digital multimedia tampering detection for forensics analysis,” Symmetry, vol. 12, no. 11, p. 1811, 2020.
K. B. Meena and V. Tyagi, “Image forgery detection: survey and future directions,” Data, Engineering and Applications: Volume 2, pp. 163–194,
G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A survey,” Digital investigation, vol. 10, no. 3, pp. 226–245, 2013.
M. D. Ansari, S. P. Ghrera, and V. Tyagi, “Pixel-based image forgery detection: A review,” IETE journal of education, vol. 55, no. 1, pp. 40–46,2014.
A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” 2004.
W. Luo, J. Huang, and G. Qiu, “Robust detection of region-duplication forgery in digital image,” in 18th International Conference on Pattern Recognition (ICPR’06), vol. 4, pp. 746–749, IEEE, 2006.
E. A. A. Vega, E. G. Fern´andez, A. L. S. Orozco, and L. J. G. Villalba, “Passive image forgery detection based on the demosaicing algorithm and jpeg compression,” IEEE Access, vol. 8, pp. 11815–11823, 2020.
S. Farooq, M. H. Yousaf, and F. Hussain, “A generic passive image forgery detection scheme using local binary pattern with rich models,”
Computers & Electrical Engineering, vol. 62, pp. 459–472, 2017.
S. Panda and M. Mishra, “Passive techniques of digital image forgery detection: developments and challenges,” in Advances in Electronics, Communication and Computing: ETAEERE-2016,
pp. 281–290, Springer, 2018.
S. K. Raj, B. S. Mohanty, J. Rout, A. Soni, and S. K. Nanda, “An automated deep learning model for detecting image forgeries,” in 2024 International Conference on Electrical Electronics and
Computing Technologies (ICEECT), vol. 1, pp. 1–6, 2024.
J. Fridrich, “Image watermarking for tamper detection,” in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), vol. 2, pp. 404–408, IEEE, 1998.
M. Begum and M. S. Uddin, “Digital image watermarking techniques: a review,” Information, vol. 11, no. 2, p. 110, 2020.
S. K. Behera and M. Mishra, “Steganography–a game of hide and seek in information communication,” arXiv preprint arXiv:1604.00493, 2016.
G. L. Friedman, “The trustworthy digital camera: Restoring credibility to the photographic image,” IEEE Transactions on consumer electronics, vol. 39, no. 4, pp. 905–910, 1993.
S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications,” IEEE Journal on Selected areas in Communications, vol. 16, no. 4, pp. 573–586, 1998.
M. M. Yeung and F. C. Mintzer, “Invisible water marking for image verification,” Journal of Electronic imaging, vol. 7, no. 3, pp. 578–591, 1998.
F. Mintzer and G. W. Braudaway, “If one watermark is good, are more better?,” in 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99
(Cat. No. 99CH36258), vol. 4, pp. 2067–2069, IEEE, 1999.
M. S. D. Mashalkar and S. Shirgan, “Design of watermarking scheme in medical image authentication using dwt and svd technique,” in 2017 International Conference on Computing Method-
ologies and Communication (ICCMC), pp. 955–960, IEEE, 2017.
S. M. Alessio and S. M. Alessio, “Discrete wavelet transform (dwt),” Digital signal processing and spectral analysis for scientists: concepts and applications, pp. 645–714, 2016.
D. Zhang and D. Zhang, “Wavelet transform,” Fundamentals of image data mining: Analysis, Features, Classification and Retrieval, pp. 35–44, 2019.
M. M. H. Chowdhury and A. Khatun, “Image compression using discrete wavelet transform,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 4, p. 327, 2012.
H. Prasantha, H. Shashidhara, and K. B. Murthy, “Image compression using svd,” in International conference on computational intelligence and multimedia applications (ICCIMA 2007), vol. 3,
pp. 143–145, IEEE, 2007.
S. M. Arora et al., “A dwt-svd based robust digital watermarking for digital images,” Procedia computer science, vol. 132, pp. 1441–1448, 2018.
N. Zermi, A. Khaldi, R. Kafi, F. Kahlessenane, and S. Euschi, “A dwt-svd based robust digital watermarking for medical image security,” Forensic science international, vol. 320, p. 110691,
D. Mata-Mendoza, M. Cedillo-Hernandez, F. Garcia-Ugalde, A. Cedillo-Hernandez, M. Nakano-Miyatake, and H. Perez-Meana,
“Secured telemedicine of medical imaging based on dual robust watermarking,” The Visual Computer, vol. 38, no. 6, pp. 2073–2090, 2022.
B. Mokashi, V. S. Bhat, J. D. Pujari, S. Roopashree, T. Mahesh, and D. S. Alex, “Efficient hybrid blind watermarking in dwt-dct-svd
with dual biometric features for images,” Contrast Media & Molecular Imaging, vol. 2022, no. 1, p. 2918126, 2022.
S. S. Rajput, B. Mondal, and F. Q. Warsi, “A robust watermarking scheme via optimization- based image reconstruction technique,” Multimedia Tools and Applications, vol. 82, no. 16, pp. 25039–25060, 2023.
R. Hu, J. Zhang, T. Zhang, and J. Li, “Robust-wide: Robust watermarking against instruction-driven image editing,” arXiv preprint
arXiv:2402.12688, 2024.
W.-C. Hu, W.-H. Chen, D.-Y. Huang, and C.-Y. Yang, “Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes,” Multimedia Tools and Applications, vol. 75, pp. 3495–3516, 2016.
T.-S. Nguyen, “Fragile watermarking for image authentication based on dwt-svd-dct techniques,” Multimedia Tools and Applications, vol. 80, no. 16, pp. 25107–25119, 2021.
M. Z. Salim, A. J. Abboud, and R. Yildirim, “A visual cryptography-based watermarking approach for the detection and localization of image forgery,” Electronics, vol. 11, no. 1, p. 136, 2022.
C.-C. Lin, T.-L. Lee, Y.-F. Chang, P.-F. Shiu, and B. Zhang, “Fragile watermarking for tamper localization and self-recovery based on ambtc and vq,” Electronics, vol. 12, no. 2, p. 415, 2023.
C. Zhan, L. Leng, C.-C. Chang, and J.-H. Horng, “Reversible image fragile watermarking with dual tampering detection,” Electronics, vol. 13, no. 10, p. 1884, 2024.
USC-SIPI, “Usc-sipi image database.” https://sipi.usc.edu/database/, 2024. [Accessed: 2024-06-03].
E. Hemdan, N. El Fishawy, G. Attiya, and F. El- Samie, “An efficient image watermarking approach based on wavelet fusion and singular value decomposition in wavelet domain,” in Proceeding of 3rd International Conference on Advanced Control Circuits And Systems (ACCS’013), no. 1-10, 2013.
DOI:
https://doi.org/10.31449/inf.v49i28.9176Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







