Dual image-based reversible fragile watermarking scheme for tamper detection and localization

被引:0
|
作者
Aditya Kumar Sahu
Monalisa Sahu
Pramoda Patro
Gupteswar Sahu
Soumya Ranjan Nayak
机构
[1] Amrita Vishwa Vidyapeetham,Amrita School of Computing, Amaravati Campus
[2] GIET University,Department of CSE, School of Engineering and Technology
[3] Koneru Lakshmaiah Education Foundation,Department of Engineering Mathematics, College of Engineering
[4] Raghu Engineering College,Department of Electronics and Communication Engineering
[5] KIIT Deemed to be University,School of Computer Engineering
来源
关键词
Fragile watermarking; Tamper detection and localization; Reversibility; Peak signal-to-noise ratio;
D O I
暂无
中图分类号
学科分类号
摘要
This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions from an image. The proposed scheme embeds two secret bits in each host image (HI) pixel using a pixel readjustment strategy to obtain dual watermarked images (WIs). The pixel readjustment strategy performs a maximum modification of ± 1 to the non-boundary pixels of an image based on the watermark information. The results of the study suggest that in addition to reversibility, the proposed scheme offers triple objective of high capacity, better perceptual transparency, and robustness. Experimental results also show that the proposed scheme achieves a superior peak signal-to-noise ratio (PSNR) of above 52 dB for both the WIs. Further, the proposed scheme can efficiently detect and locate the tampering regions from an image with a high true positive rate, low false positive and negative rate for various tampering rates. Additionally, the proposed scheme shows superior resistance against various intentional and unintentional attacks.
引用
收藏
页码:571 / 590
页数:19
相关论文
共 50 条
  • [1] Dual image-based reversible fragile watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Sahu, Monalisa
    Patro, Pramoda
    Sahu, Gupteswar
    Nayak, Soumya Ranjan
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2023, 26 (02) : 571 - 590
  • [2] Logistic-map based fragile image watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Hassaballah, M.
    Rao, Routhu Srinivasa
    Suresh, Gulivindala
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) : 24069 - 24100
  • [3] Logistic-map based fragile image watermarking scheme for tamper detection and localization
    Aditya Kumar Sahu
    M. Hassaballah
    Routhu Srinivasa Rao
    Gulivindala Suresh
    [J]. Multimedia Tools and Applications, 2023, 82 : 24069 - 24100
  • [4] A fragile watermarking scheme for tamper detection and recovery of image
    Zhu, Haifeng
    Chao, Chunhui
    Tang, Chunming
    [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 475 - 475
  • [5] An Image Fragile Watermarking Scheme Based on Chaotic System for Image Tamper Detection
    Moniruzzaman, Md.
    Hawlader, Md. Abul Kayum
    Hossain, Md. Foisal
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2014,
  • [6] A chaotic system based fragile watermarking scheme for image tamper detection
    Rawat, Sanjay
    Raman, Balasubramanian
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2011, 65 (10) : 840 - 847
  • [7] A novel fragile watermarking scheme for image tamper detection and recovery
    Zhu, Shaomin
    Liu, Jianming
    [J]. CHINESE OPTICS LETTERS, 2010, 8 (07) : 661 - 665
  • [8] A novel fragile watermarking scheme for image tamper detection and recovery
    朱少敏
    刘建明
    [J]. Chinese Optics Letters, 2010, 8 (07) : 661 - 665
  • [9] LBP-based Fragile Watermarking Scheme for Image Tamper Detection and Recovery
    Chang, Jun-Dong
    Chen, Bo-Hung
    Tsai, Chwei-Shyong
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS 2013 (ISNE 2013), 2013,
  • [10] A Fragile Watermarking Scheme Exploiting Neural Tree for Image Tamper Detection
    Rani, Asha
    Raman, Balasubramanian
    Kumar, Sanjeev
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 547 - 554