Hash-based image watermarking technique for tamper detection and localization
The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [ 58 ]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in mult...
Gespeichert in:
Veröffentlicht in: | Health and technology 2022-03, Vol.12 (2), p.385-400 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 400 |
---|---|
container_issue | 2 |
container_start_page | 385 |
container_title | Health and technology |
container_volume | 12 |
creator | Hussan, Muzamil Parah, Shabir A. Jan, Aiman Qureshi, G. J. |
description | The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [
58
]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose. |
doi_str_mv | 10.1007/s12553-021-00632-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2920278951</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2920278951</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIVKU_wMkSZ4PXiZ34iCpeUhEXOFuOvW5T2qTYqRB8PS5BcGMvuxrN7O4MIefAL4Hz6iqBkLJgXADjXBWC6SMyEaA5q0Cr49-5rk_JLKU1zyVB6rKYkMd7m1assQk9bbd2ifTdDhi3Nr623ZIO6FZd-7ZHGvpIB7vdYaQeMzy0fUdt5-mmd3bTftoDcEZOgt0knP30KXm5vXme37PF093D_HrBXAF6YMGXlVS-tOBQAsdaVaHAEkEIFbxsfFlzxbMpV5bK-uCaBmzjvEQHFmVVTMnFuHcX-_xcGsy638cunzRCCy6qWkvILDGyXOxTihjMLmaP8cMAN4fkzJicycmZ7-SMzqJiFKVM7pYY_1b_o_oCYt1xsA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2920278951</pqid></control><display><type>article</type><title>Hash-based image watermarking technique for tamper detection and localization</title><source>ProQuest Central (Alumni Edition)</source><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Hussan, Muzamil ; Parah, Shabir A. ; Jan, Aiman ; Qureshi, G. J.</creator><creatorcontrib>Hussan, Muzamil ; Parah, Shabir A. ; Jan, Aiman ; Qureshi, G. J.</creatorcontrib><description>The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [
58
]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.</description><identifier>ISSN: 2190-7188</identifier><identifier>EISSN: 2190-7196</identifier><identifier>DOI: 10.1007/s12553-021-00632-9</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Authenticity ; Biological and Medical Physics ; Biomedical Engineering and Bioengineering ; Biomedicine ; Biophysics ; Computational Biology/Bioinformatics ; Digital imaging ; Digital signatures ; Discrete cosine transform ; Engineering ; Image processing ; Internet ; Literature reviews ; Localization ; Mathematical functions ; Medicine/Public Health ; Multimedia ; Original Paper ; R & D/Technology Policy ; Signal processing ; Watermarking</subject><ispartof>Health and technology, 2022-03, Vol.12 (2), p.385-400</ispartof><rights>IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2022</rights><rights>IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2022.</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</citedby><cites>FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</cites><orcidid>0000-0001-5983-0912</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12553-021-00632-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2920278951?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,21389,27924,27925,33530,33744,41488,42557,43659,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Hussan, Muzamil</creatorcontrib><creatorcontrib>Parah, Shabir A.</creatorcontrib><creatorcontrib>Jan, Aiman</creatorcontrib><creatorcontrib>Qureshi, G. J.</creatorcontrib><title>Hash-based image watermarking technique for tamper detection and localization</title><title>Health and technology</title><addtitle>Health Technol</addtitle><description>The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [
58
]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.</description><subject>Authenticity</subject><subject>Biological and Medical Physics</subject><subject>Biomedical Engineering and Bioengineering</subject><subject>Biomedicine</subject><subject>Biophysics</subject><subject>Computational Biology/Bioinformatics</subject><subject>Digital imaging</subject><subject>Digital signatures</subject><subject>Discrete cosine transform</subject><subject>Engineering</subject><subject>Image processing</subject><subject>Internet</subject><subject>Literature reviews</subject><subject>Localization</subject><subject>Mathematical functions</subject><subject>Medicine/Public Health</subject><subject>Multimedia</subject><subject>Original Paper</subject><subject>R & D/Technology Policy</subject><subject>Signal processing</subject><subject>Watermarking</subject><issn>2190-7188</issn><issn>2190-7196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNp9UMtOwzAQtBBIVKU_wMkSZ4PXiZ34iCpeUhEXOFuOvW5T2qTYqRB8PS5BcGMvuxrN7O4MIefAL4Hz6iqBkLJgXADjXBWC6SMyEaA5q0Cr49-5rk_JLKU1zyVB6rKYkMd7m1assQk9bbd2ifTdDhi3Nr623ZIO6FZd-7ZHGvpIB7vdYaQeMzy0fUdt5-mmd3bTftoDcEZOgt0knP30KXm5vXme37PF093D_HrBXAF6YMGXlVS-tOBQAsdaVaHAEkEIFbxsfFlzxbMpV5bK-uCaBmzjvEQHFmVVTMnFuHcX-_xcGsy638cunzRCCy6qWkvILDGyXOxTihjMLmaP8cMAN4fkzJicycmZ7-SMzqJiFKVM7pYY_1b_o_oCYt1xsA</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Hussan, Muzamil</creator><creator>Parah, Shabir A.</creator><creator>Jan, Aiman</creator><creator>Qureshi, G. J.</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7RV</scope><scope>7X7</scope><scope>7XB</scope><scope>88C</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB0</scope><scope>M0S</scope><scope>M0T</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-5983-0912</orcidid></search><sort><creationdate>20220301</creationdate><title>Hash-based image watermarking technique for tamper detection and localization</title><author>Hussan, Muzamil ; Parah, Shabir A. ; Jan, Aiman ; Qureshi, G. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-fd4756d4a1ce510e867f3e4e1226fd5bd48060255c446adfcbb1abcd5ec1ae573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authenticity</topic><topic>Biological and Medical Physics</topic><topic>Biomedical Engineering and Bioengineering</topic><topic>Biomedicine</topic><topic>Biophysics</topic><topic>Computational Biology/Bioinformatics</topic><topic>Digital imaging</topic><topic>Digital signatures</topic><topic>Discrete cosine transform</topic><topic>Engineering</topic><topic>Image processing</topic><topic>Internet</topic><topic>Literature reviews</topic><topic>Localization</topic><topic>Mathematical functions</topic><topic>Medicine/Public Health</topic><topic>Multimedia</topic><topic>Original Paper</topic><topic>R & D/Technology Policy</topic><topic>Signal processing</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Hussan, Muzamil</creatorcontrib><creatorcontrib>Parah, Shabir A.</creatorcontrib><creatorcontrib>Jan, Aiman</creatorcontrib><creatorcontrib>Qureshi, G. J.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Nursing & Allied Health Database</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Healthcare Administration Database (Alumni)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Healthcare Administration Database</collection><collection>Nursing & Allied Health Premium</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Health and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hussan, Muzamil</au><au>Parah, Shabir A.</au><au>Jan, Aiman</au><au>Qureshi, G. J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hash-based image watermarking technique for tamper detection and localization</atitle><jtitle>Health and technology</jtitle><stitle>Health Technol</stitle><date>2022-03-01</date><risdate>2022</risdate><volume>12</volume><issue>2</issue><spage>385</spage><epage>400</epage><pages>385-400</pages><issn>2190-7188</issn><eissn>2190-7196</eissn><abstract>The accumulating and proliferating of the internet has increased ten folds from the year 2010 to 2020 according to the Ericsson report [
58
]. This trend is further increasing, making the transmission of multimedia much easier. However, the impetuous growth of data breaches and manipulations in multimedia has become a matter of concern. In such a scenario the main concern is the security of multimedia data besides protecting its integrity and authenticity. In this work, a new approach utilizing hashing and watermarking has been proposed for tamper detection and localization of digital images. At first, the original cover image is segmented into 4 × 4 non-overlapping blocks. For each 4 × 4 block, Discrete Cosine Transform (DCT) is applied to extract the DC coefficients. Further, a hash is generated from these coefficients using the SHA-256 hash function. The original cover image is Arnold Transformed and then segmented into 4 × 4 blocks to embed the extracted hash (16 bits in each block). Afterward, Inverse Arnold Transform is applied to obtain the watermarked image. The proposed approach is found to be resistant to different image processing attacks, copy-paste attacks, and copy-move attacks. Moreover, the average PSNR value of 51.16 dB along with the average SSIM value of 0.9965 has been reported for the presented scheme that is higher compared to already existing schemes. Also, the average FPR value for random tampering is found to be 4.6986 that is better compared to the state-of-the-art technique. The scheme can detect and localize the tamper more efficiently compared to the existing schemes making it a competent contender for the said purpose.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12553-021-00632-9</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0001-5983-0912</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2190-7188 |
ispartof | Health and technology, 2022-03, Vol.12 (2), p.385-400 |
issn | 2190-7188 2190-7196 |
language | eng |
recordid | cdi_proquest_journals_2920278951 |
source | ProQuest Central (Alumni Edition); ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Authenticity Biological and Medical Physics Biomedical Engineering and Bioengineering Biomedicine Biophysics Computational Biology/Bioinformatics Digital imaging Digital signatures Discrete cosine transform Engineering Image processing Internet Literature reviews Localization Mathematical functions Medicine/Public Health Multimedia Original Paper R & D/Technology Policy Signal processing Watermarking |
title | Hash-based image watermarking technique for tamper detection and localization |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T17%3A28%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hash-based%20image%20watermarking%20technique%20for%20tamper%20detection%20and%20localization&rft.jtitle=Health%20and%20technology&rft.au=Hussan,%20Muzamil&rft.date=2022-03-01&rft.volume=12&rft.issue=2&rft.spage=385&rft.epage=400&rft.pages=385-400&rft.issn=2190-7188&rft.eissn=2190-7196&rft_id=info:doi/10.1007/s12553-021-00632-9&rft_dat=%3Cproquest_cross%3E2920278951%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2920278951&rft_id=info:pmid/&rfr_iscdi=true |