Hash-based image watermarking technique for tamper detection and localization

The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [ 58 ]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in mult...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Health and technology 2022-03, Vol.12 (2), p.385-400
Hauptverfasser: Hussan, Muzamil, Parah, Shabir A., Jan, Aiman, Qureshi, G. J.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 400
container_issue 2
container_start_page 385
container_title Health and technology
container_volume 12
creator Hussan, Muzamil
Parah, Shabir A.
Jan, Aiman
Qureshi, G. J.
description The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [ 58 ]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.
doi_str_mv 10.1007/s12553-021-00632-9
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2920278951</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2920278951</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIVKU_wMkSZ4PXiZ34iCpeUhEXOFuOvW5T2qTYqRB8PS5BcGMvuxrN7O4MIefAL4Hz6iqBkLJgXADjXBWC6SMyEaA5q0Cr49-5rk_JLKU1zyVB6rKYkMd7m1assQk9bbd2ifTdDhi3Nr623ZIO6FZd-7ZHGvpIB7vdYaQeMzy0fUdt5-mmd3bTftoDcEZOgt0knP30KXm5vXme37PF093D_HrBXAF6YMGXlVS-tOBQAsdaVaHAEkEIFbxsfFlzxbMpV5bK-uCaBmzjvEQHFmVVTMnFuHcX-_xcGsy638cunzRCCy6qWkvILDGyXOxTihjMLmaP8cMAN4fkzJicycmZ7-SMzqJiFKVM7pYY_1b_o_oCYt1xsA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2920278951</pqid></control><display><type>article</type><title>Hash-based image watermarking technique for tamper detection and localization</title><source>ProQuest Central (Alumni Edition)</source><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Hussan, Muzamil ; Parah, Shabir A. ; Jan, Aiman ; Qureshi, G. J.</creator><creatorcontrib>Hussan, Muzamil ; Parah, Shabir A. ; Jan, Aiman ; Qureshi, G. J.</creatorcontrib><description>The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [ 58 ]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.</description><identifier>ISSN: 2190-7188</identifier><identifier>EISSN: 2190-7196</identifier><identifier>DOI: 10.1007/s12553-021-00632-9</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Authenticity ; Biological and Medical Physics ; Biomedical Engineering and Bioengineering ; Biomedicine ; Biophysics ; Computational Biology/Bioinformatics ; Digital imaging ; Digital signatures ; Discrete cosine transform ; Engineering ; Image processing ; Internet ; Literature reviews ; Localization ; Mathematical functions ; Medicine/Public Health ; Multimedia ; Original Paper ; R &amp; D/Technology Policy ; Signal processing ; Watermarking</subject><ispartof>Health and technology, 2022-03, Vol.12 (2), p.385-400</ispartof><rights>IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2022</rights><rights>IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2022.</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</citedby><cites>FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</cites><orcidid>0000-0001-5983-0912</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12553-021-00632-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2920278951?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,21389,27924,27925,33530,33744,41488,42557,43659,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Hussan, Muzamil</creatorcontrib><creatorcontrib>Parah, Shabir A.</creatorcontrib><creatorcontrib>Jan, Aiman</creatorcontrib><creatorcontrib>Qureshi, G. J.</creatorcontrib><title>Hash-based image watermarking technique for tamper detection and localization</title><title>Health and technology</title><addtitle>Health Technol</addtitle><description>The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [ 58 ]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.</description><subject>Authenticity</subject><subject>Biological and Medical Physics</subject><subject>Biomedical Engineering and Bioengineering</subject><subject>Biomedicine</subject><subject>Biophysics</subject><subject>Computational Biology/Bioinformatics</subject><subject>Digital imaging</subject><subject>Digital signatures</subject><subject>Discrete cosine transform</subject><subject>Engineering</subject><subject>Image processing</subject><subject>Internet</subject><subject>Literature reviews</subject><subject>Localization</subject><subject>Mathematical functions</subject><subject>Medicine/Public Health</subject><subject>Multimedia</subject><subject>Original Paper</subject><subject>R &amp; D/Technology Policy</subject><subject>Signal processing</subject><subject>Watermarking</subject><issn>2190-7188</issn><issn>2190-7196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNp9UMtOwzAQtBBIVKU_wMkSZ4PXiZ34iCpeUhEXOFuOvW5T2qTYqRB8PS5BcGMvuxrN7O4MIefAL4Hz6iqBkLJgXADjXBWC6SMyEaA5q0Cr49-5rk_JLKU1zyVB6rKYkMd7m1assQk9bbd2ifTdDhi3Nr623ZIO6FZd-7ZHGvpIB7vdYaQeMzy0fUdt5-mmd3bTftoDcEZOgt0knP30KXm5vXme37PF093D_HrBXAF6YMGXlVS-tOBQAsdaVaHAEkEIFbxsfFlzxbMpV5bK-uCaBmzjvEQHFmVVTMnFuHcX-_xcGsy638cunzRCCy6qWkvILDGyXOxTihjMLmaP8cMAN4fkzJicycmZ7-SMzqJiFKVM7pYY_1b_o_oCYt1xsA</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Hussan, Muzamil</creator><creator>Parah, Shabir A.</creator><creator>Jan, Aiman</creator><creator>Qureshi, G. J.</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7RV</scope><scope>7X7</scope><scope>7XB</scope><scope>88C</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB0</scope><scope>M0S</scope><scope>M0T</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-5983-0912</orcidid></search><sort><creationdate>20220301</creationdate><title>Hash-based image watermarking technique for tamper detection and localization</title><author>Hussan, Muzamil ; Parah, Shabir A. ; Jan, Aiman ; Qureshi, G. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authenticity</topic><topic>Biological and Medical Physics</topic><topic>Biomedical Engineering and Bioengineering</topic><topic>Biomedicine</topic><topic>Biophysics</topic><topic>Computational Biology/Bioinformatics</topic><topic>Digital imaging</topic><topic>Digital signatures</topic><topic>Discrete cosine transform</topic><topic>Engineering</topic><topic>Image processing</topic><topic>Internet</topic><topic>Literature reviews</topic><topic>Localization</topic><topic>Mathematical functions</topic><topic>Medicine/Public Health</topic><topic>Multimedia</topic><topic>Original Paper</topic><topic>R &amp; D/Technology Policy</topic><topic>Signal processing</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Hussan, Muzamil</creatorcontrib><creatorcontrib>Parah, Shabir A.</creatorcontrib><creatorcontrib>Jan, Aiman</creatorcontrib><creatorcontrib>Qureshi, G. J.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Nursing &amp; Allied Health Database</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Healthcare Administration Database (Alumni)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Nursing &amp; Allied Health Database (Alumni Edition)</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Healthcare Administration Database</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Health and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hussan, Muzamil</au><au>Parah, Shabir A.</au><au>Jan, Aiman</au><au>Qureshi, G. J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hash-based image watermarking technique for tamper detection and localization</atitle><jtitle>Health and technology</jtitle><stitle>Health Technol</stitle><date>2022-03-01</date><risdate>2022</risdate><volume>12</volume><issue>2</issue><spage>385</spage><epage>400</epage><pages>385-400</pages><issn>2190-7188</issn><eissn>2190-7196</eissn><abstract>The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [ 58 ]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12553-021-00632-9</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0001-5983-0912</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2190-7188
ispartof Health and technology, 2022-03, Vol.12 (2), p.385-400
issn 2190-7188
2190-7196
language eng
recordid cdi_proquest_journals_2920278951
source ProQuest Central (Alumni Edition); ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central
subjects Authenticity
Biological and Medical Physics
Biomedical Engineering and Bioengineering
Biomedicine
Biophysics
Computational Biology/Bioinformatics
Digital imaging
Digital signatures
Discrete cosine transform
Engineering
Image processing
Internet
Literature reviews
Localization
Mathematical functions
Medicine/Public Health
Multimedia
Original Paper
R & D/Technology Policy
Signal processing
Watermarking
title Hash-based image watermarking technique for tamper detection and localization
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T17%3A28%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hash-based%20image%20watermarking%20technique%20for%20tamper%20detection%20and%20localization&rft.jtitle=Health%20and%20technology&rft.au=Hussan,%20Muzamil&rft.date=2022-03-01&rft.volume=12&rft.issue=2&rft.spage=385&rft.epage=400&rft.pages=385-400&rft.issn=2190-7188&rft.eissn=2190-7196&rft_id=info:doi/10.1007/s12553-021-00632-9&rft_dat=%3Cproquest_cross%3E2920278951%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2920278951&rft_id=info:pmid/&rfr_iscdi=true