Image tamper detection and correction using Merkle tree and remainder value differencing

被引:3
|
作者
Kosuru, S. N. V. J. Devi [1 ]
Swain, Gandharba [1 ]
Kumar, Naween [1 ]
Pradhan, Anita [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522302, Andhra Pradesh, India
[2] PSCMR Coll Engn & Technol, Dept Comp Sci & Engn, Vijayawada 520001, Andhra Pradesh, India
来源
OPTIK | 2022年 / 261卷
关键词
Data hiding; Tamper detection; Remainder value differencing; Watermarking; Tamper correction; FRAGILE WATERMARKING SCHEME; IMPROVED PVO; LOCALIZATION;
D O I
10.1016/j.ijleo.2022.169212
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This article proposes an image tamper detection and correction technique. It uses the principle of differencing and addresses the fall off boundary problem (FOBP). It operates on 2 x 2 non-overlapped blocks. From each pixel of a block the decimal value for 4 most significant bits (MSBs), is called as quotient, and the decimal value for 4 least significant bits (LSBs) is called as remainder. The 4 watermark bits (WBs) are computed from 4 quotients as the root of Merkle tree. These 4 WBs are XORed with the 4 bits generated from logistic map sequence to generate the 4 recovery bits (RBs). The 4 WBs and 4 RBs are stored in 4 remainders by LSB alteration and remainder value differencing (RVD). While extracting the watermark, the tampered blocks can be identified and a correction logic can be applied to get the true value of the pixels in the block. The peak signal-to-noise ratio (PSNR) value is 42.02 dB and structural similarity (SSIM) index value is 0.9765. The tampered blocks can be accurately identified and corrected.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree
    Khadse, Dipak Bhayyaji
    Swain, Gandharba
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 1793 - 1805
  • [2] Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree
    Dipak Bhayyaji Khadse
    Gandharba Swain
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 1793 - 1805
  • [3] Image watermarking based on remainder value differencing and extended Hamming code
    Gottimukkala, Anantha Rao
    Kumar, Naween
    Dash, Jatindra Kumar
    Swain, Gandharba
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (01)
  • [4] An Image Authentication Scheme Using Merkle Tree Mechanisms
    Chen, Yi-Cheng
    Chou, Yueh-Peng
    Chou, Yung-Chen
    [J]. FUTURE INTERNET, 2019, 11 (07):
  • [5] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Khadse, Dipak Bhayyaji
    Swain, Gandharba
    [J]. SENSING AND IMAGING, 2021, 22 (01):
  • [6] Data Hiding Using Quotient Value Differencing and Remainder Value Substitution Avoiding Incorrect Extraction Problem
    Dipak Bhayyaji Khadse
    Gandharba Swain
    [J]. Sensing and Imaging, 2021, 22
  • [7] Image tamper detection using mathematical morphology
    Kihara, Mirei
    Fujiyoshi, Masaaki
    Wan, Qing Tao
    Kiya, Hitoshi
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 2897 - 2900
  • [8] A Fragile Watermarking Scheme Exploiting Neural Tree for Image Tamper Detection
    Rani, Asha
    Raman, Balasubramanian
    Kumar, Sanjeev
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 547 - 554
  • [9] Image Steganography using Pixel-Value Differencing
    Zhang, Han-ling
    Geng, Guang-zhi
    Xiong, Cai-qiong
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 109 - 112
  • [10] Singular Value Decomposition (SVD) based Image Tamper Detection Scheme
    Kaur, Sandeep
    Jindal, Alka
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 695 - 699