Page 83 - IJEEE-2023-Vol19-ISSUE-1
P. 83
Received: 04 September 2022 Revised: 01 October 2022 Accepted: 01 October 2022
DOI: 10.37917/ijeee.19.1.10
Vol. 19| Issue 1| June 2023
Ð Open Access
Iraqi Journal for Electrical and Electronic Engineering
Original Article
Fragile Watermarks Detecting Forged Images
Hala K. Hussein *1, Ra'ad A. Muhajjar 2, Bashar S. Mahdi3
1 Computer Science Dept., College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
2 Computer Science Dept., College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
3Computer Science Dept., College of Computer Science, University of Technology, Baghdad, Iraq,
Correspondence
Hala k. Hussein
Department of Computer science,
College of Computer Science and Information Technology,
University of Basrah, Basrah, Iraq.
Email: itpg.hala.khalid@uobasrah.edu.iq
Abstract
Technology and digital communications have advanced so that digital photos, videos, or text may be easily manipulated by
those not authorized to do so. In addition, the availability of specialized picture editing programs like Photoshop has simplified
the process of altering photographs. At first glance, there may seem to be no problem, especially when an image editing method
is necessary to delete or add a certain scene that increases the picture's beauty. But what about personal images or images with
copyright? Attempts are constantly made to spoof these images using different approaches. Therefore, measures to reduce the
likelihood of counterfeiting in digital and printed forms of media are required. The proposed approach aims to detect a
counterfeit in images using a unique generator that conceals the data represented by the embedded watermark utilizing modern
visual cryptography and hash algorithms. Image extractions may easily be analyzed for signs of forgery. As a result, our
approach will detect and validate phony documents and images.
KEYWORDS: Fragile watermark, spatial domain, LSB, Image.
I. INTRODUCTION to methods reported in previous publications using this
strategy. While spatial watermarks are easy and fast to
The richness and complexity of multimedia information pose install, their fragility causes them to be seen as weak.
significant challenges to human life and activity. One of the Multiplicative watermarking techniques, including the more
most widely shared forms of multimedia on the web is digital well-known Transform-domain watermarks, are widely
images, which can be easily copied and edited. Users thus considered secure against attacks [5]. Digital watermarking
have a significant issue in securing the data sent via it [1][2]. might be visible or invisible, but our work would be
In recent years, protecting sensitive data has grown more invisible. Additionally, a watermark may be robust, fragile,
crucial. Advancements necessitate new methods of data or semi-fragile [6].
transmission security in transmission technologies.
Watermarking is a kind of security system that has been II. RELATED WORK
developed as a technological solution for information
security [3].The word "watermark" refers to a group of bits Raj & Shreelekshmi, 2018, they utilized two fragile
used to identify the private information added to an image to watermarks in this paper as additional security. They started
prevent unauthorized usage. For maximum protection, the by using MD5 to build a 128-bit representation of the
watermark should be integrated into the image rather than original picture by dividing it into 8x8 chunks. The first
distinct from it. The image may be entirely undetectable to fragile watermark is represented as a 2LSB and is embedded
human sight while still being readable by computers, and the in each block. The second method is identical to the first,
quality of the image is kept with little loss [4]. Two domains except that the image is broken up into 16x16 blocks. Use of
in which the watermark may be implemented are the spatial the SHA-256 hashing method is at the core of the
domain and the Transform domain. Among the several watermark's generation. The produced 256 bits are saved in
methods of digital watermarking, spatial domain the cover image's least significant bit [7].
watermarking is the most straightforward. Spatial domain Chitra, K., & Prasanna Venkatesan, V., 2018, VC with
watermarking has a lengthy history. While developing the watermarking was suggested as a technique. The picture's
embedding and extraction algorithms, researchers offered colors have been converted to binary, and the resulting image
approaches to adding the watermark to the original picture has been divided in two. As a result of this method, the
by modifying the pixel values in the spatial domain, similar receiver will get a cover image that includes one of the
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and
reproduction in any medium, provided the original work is properly cited.
© 2023 The Authors. Published by Iraqi Journal for Electrical and Electronic Engineering by College of Engineering, University of Basrah.
https://doi.org/10.37917/ijeee.19.1.10 https://www.ijeee.edu.iq 79