An efficient hidden marking approach for forensic and contents verification of digital images

Recently, forensic tools have been presented for detecting the forged image and illegal image manipulations. This paper presents an efficient and simple image contents verifying approach acting as a forensic technique. The presented approach mechanism is built by adding a hidden mark in a secret ima...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023-07, Vol.82 (17), p.25527-25558
Hauptverfasser: El-Bendary, Mohsen A. M., Faragallah, Osama S., Nassar, Sabry S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 25558
container_issue 17
container_start_page 25527
container_title Multimedia tools and applications
container_volume 82
creator El-Bendary, Mohsen A. M.
Faragallah, Osama S.
Nassar, Sabry S.
description Recently, forensic tools have been presented for detecting the forged image and illegal image manipulations. This paper presents an efficient and simple image contents verifying approach acting as a forensic technique. The presented approach mechanism is built by adding a hidden mark in a secret images, this mark achieves image integrity verification and detecting the tampering or forgery in the secret/authentic images. The secret/authentic/authentic image is divided to two main partitions, each portion is segmented to small blocks. These blocks in one partition are used to mark the blocks of the second partition using data transform technique. Firstly, the sensitive image is marked according to a self-embedding method. Then, a transform domain is utilized in order to embed a block-based signature into another block of the same image. Common discrete transform domains like DWT, DCT, and DFT are examined individually. Different analyses and comparison measurements are employed. The DCT is proved to be the most suitable and efficient transform domain to be used with the proposed scheme. At the receiver side, the reverse process is performed to verify image integrity. As proved from the experiments, this mark-algorithm is not visible or observable and robust against various attacks.
doi_str_mv 10.1007/s11042-022-14104-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2828978348</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2828978348</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-be8798161122881206e80ef7a9498ab974edda1765ea530dc47387f90f7615b13</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWKt_wFPAczST7G6yx1LUCgUvepSQ7k62qW22JlvBf2_qCt48DDOH9715PEKugd8C5-ouAfBCMC4EgyKfTJ6QCZRKMqUEnOZbas5UyeGcXKS04RyqUhQT8jYLFJ3zjccw0LVvWwx0Z-O7Dx21-33sbbOmro_HwZB8Q21oadOHIQOJfmL0mbaD7wPtHW195we7pX5nO0yX5MzZbcKr3z0lrw_3L_MFWz4_Ps1nS9bISg5shVrVGioAIbQGwSvUHJ2ydVFru6pVgW1rQVUl2lLytimU1MrV3KkKyhXIKbkZfXPejwOmwWz6Qwz5pRFa6FppWeisEqOqiX1KEZ3Zx5wzfhng5lijGWs0uUbzU6ORGZIjlLI4dBj_rP-hvgFp23Th</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2828978348</pqid></control><display><type>article</type><title>An efficient hidden marking approach for forensic and contents verification of digital images</title><source>SpringerLink Journals - AutoHoldings</source><creator>El-Bendary, Mohsen A. M. ; Faragallah, Osama S. ; Nassar, Sabry S.</creator><creatorcontrib>El-Bendary, Mohsen A. M. ; Faragallah, Osama S. ; Nassar, Sabry S.</creatorcontrib><description>Recently, forensic tools have been presented for detecting the forged image and illegal image manipulations. This paper presents an efficient and simple image contents verifying approach acting as a forensic technique. The presented approach mechanism is built by adding a hidden mark in a secret images, this mark achieves image integrity verification and detecting the tampering or forgery in the secret/authentic images. The secret/authentic/authentic image is divided to two main partitions, each portion is segmented to small blocks. These blocks in one partition are used to mark the blocks of the second partition using data transform technique. Firstly, the sensitive image is marked according to a self-embedding method. Then, a transform domain is utilized in order to embed a block-based signature into another block of the same image. Common discrete transform domains like DWT, DCT, and DFT are examined individually. Different analyses and comparison measurements are employed. The DCT is proved to be the most suitable and efficient transform domain to be used with the proposed scheme. At the receiver side, the reverse process is performed to verify image integrity. As proved from the experiments, this mark-algorithm is not visible or observable and robust against various attacks.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-022-14104-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Digital imaging ; Domains ; Forgery ; Image manipulation ; Integrity ; Multimedia Information Systems ; Special Purpose and Application-Based Systems ; Verification</subject><ispartof>Multimedia tools and applications, 2023-07, Vol.82 (17), p.25527-25558</ispartof><rights>The Author(s) 2023</rights><rights>The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-be8798161122881206e80ef7a9498ab974edda1765ea530dc47387f90f7615b13</citedby><cites>FETCH-LOGICAL-c363t-be8798161122881206e80ef7a9498ab974edda1765ea530dc47387f90f7615b13</cites><orcidid>0000-0002-2425-4967</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-022-14104-3$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-022-14104-3$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>El-Bendary, Mohsen A. M.</creatorcontrib><creatorcontrib>Faragallah, Osama S.</creatorcontrib><creatorcontrib>Nassar, Sabry S.</creatorcontrib><title>An efficient hidden marking approach for forensic and contents verification of digital images</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Recently, forensic tools have been presented for detecting the forged image and illegal image manipulations. This paper presents an efficient and simple image contents verifying approach acting as a forensic technique. The presented approach mechanism is built by adding a hidden mark in a secret images, this mark achieves image integrity verification and detecting the tampering or forgery in the secret/authentic images. The secret/authentic/authentic image is divided to two main partitions, each portion is segmented to small blocks. These blocks in one partition are used to mark the blocks of the second partition using data transform technique. Firstly, the sensitive image is marked according to a self-embedding method. Then, a transform domain is utilized in order to embed a block-based signature into another block of the same image. Common discrete transform domains like DWT, DCT, and DFT are examined individually. Different analyses and comparison measurements are employed. The DCT is proved to be the most suitable and efficient transform domain to be used with the proposed scheme. At the receiver side, the reverse process is performed to verify image integrity. As proved from the experiments, this mark-algorithm is not visible or observable and robust against various attacks.</description><subject>Algorithms</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Digital imaging</subject><subject>Domains</subject><subject>Forgery</subject><subject>Image manipulation</subject><subject>Integrity</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Verification</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kEFLAzEQhYMoWKt_wFPAczST7G6yx1LUCgUvepSQ7k62qW22JlvBf2_qCt48DDOH9715PEKugd8C5-ouAfBCMC4EgyKfTJ6QCZRKMqUEnOZbas5UyeGcXKS04RyqUhQT8jYLFJ3zjccw0LVvWwx0Z-O7Dx21-33sbbOmro_HwZB8Q21oadOHIQOJfmL0mbaD7wPtHW195we7pX5nO0yX5MzZbcKr3z0lrw_3L_MFWz4_Ps1nS9bISg5shVrVGioAIbQGwSvUHJ2ydVFru6pVgW1rQVUl2lLytimU1MrV3KkKyhXIKbkZfXPejwOmwWz6Qwz5pRFa6FppWeisEqOqiX1KEZ3Zx5wzfhng5lijGWs0uUbzU6ORGZIjlLI4dBj_rP-hvgFp23Th</recordid><startdate>20230701</startdate><enddate>20230701</enddate><creator>El-Bendary, Mohsen A. M.</creator><creator>Faragallah, Osama S.</creator><creator>Nassar, Sabry S.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-2425-4967</orcidid></search><sort><creationdate>20230701</creationdate><title>An efficient hidden marking approach for forensic and contents verification of digital images</title><author>El-Bendary, Mohsen A. M. ; Faragallah, Osama S. ; Nassar, Sabry S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-be8798161122881206e80ef7a9498ab974edda1765ea530dc47387f90f7615b13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Digital imaging</topic><topic>Domains</topic><topic>Forgery</topic><topic>Image manipulation</topic><topic>Integrity</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>El-Bendary, Mohsen A. M.</creatorcontrib><creatorcontrib>Faragallah, Osama S.</creatorcontrib><creatorcontrib>Nassar, Sabry S.</creatorcontrib><collection>SpringerOpen</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>El-Bendary, Mohsen A. M.</au><au>Faragallah, Osama S.</au><au>Nassar, Sabry S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An efficient hidden marking approach for forensic and contents verification of digital images</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-07-01</date><risdate>2023</risdate><volume>82</volume><issue>17</issue><spage>25527</spage><epage>25558</epage><pages>25527-25558</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Recently, forensic tools have been presented for detecting the forged image and illegal image manipulations. This paper presents an efficient and simple image contents verifying approach acting as a forensic technique. The presented approach mechanism is built by adding a hidden mark in a secret images, this mark achieves image integrity verification and detecting the tampering or forgery in the secret/authentic images. The secret/authentic/authentic image is divided to two main partitions, each portion is segmented to small blocks. These blocks in one partition are used to mark the blocks of the second partition using data transform technique. Firstly, the sensitive image is marked according to a self-embedding method. Then, a transform domain is utilized in order to embed a block-based signature into another block of the same image. Common discrete transform domains like DWT, DCT, and DFT are examined individually. Different analyses and comparison measurements are employed. The DCT is proved to be the most suitable and efficient transform domain to be used with the proposed scheme. At the receiver side, the reverse process is performed to verify image integrity. As proved from the experiments, this mark-algorithm is not visible or observable and robust against various attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-022-14104-3</doi><tpages>32</tpages><orcidid>https://orcid.org/0000-0002-2425-4967</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2023-07, Vol.82 (17), p.25527-25558
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2828978348
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Computer Communication Networks
Computer Science
Data Structures and Information Theory
Digital imaging
Domains
Forgery
Image manipulation
Integrity
Multimedia Information Systems
Special Purpose and Application-Based Systems
Verification
title An efficient hidden marking approach for forensic and contents verification of digital images
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T17%3A22%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20efficient%20hidden%20marking%20approach%20for%20forensic%20and%20contents%20verification%20of%20digital%20images&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=El-Bendary,%20Mohsen%20A.%20M.&rft.date=2023-07-01&rft.volume=82&rft.issue=17&rft.spage=25527&rft.epage=25558&rft.pages=25527-25558&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-022-14104-3&rft_dat=%3Cproquest_cross%3E2828978348%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2828978348&rft_id=info:pmid/&rfr_iscdi=true