Cover
Vol. 19 No. 1 (2023)

Published: June 30, 2023

Pages: 79-86

Original Article

Fragile Watermarks Detecting Forged Images

Abstract

Technology and digital communications have advanced so that digital photos, videos, or text may be easily manipulated by those not authorized to do so. In addition, the availability of specialized picture editing programs like Photoshop has simplified the process of altering photographs. At first glance, there may seem to be no problem, especially when an image editing method is necessary to delete or add a certain scene that increases the picture's beauty. But what about personal images or images with copyright? Attempts are constantly made to spoof these images using different approaches. Therefore, measures to reduce the likelihood of counterfeiting in digital and printed forms of media are required. The proposed approach aims to detect a counterfeit in images using a unique generator that conceals the data represented by the embedded watermark utilizing modern visual cryptography and hash algorithms. Image extractions may easily be analyzed for signs of forgery. As a result, our approach will detect and validate phony documents and images.

References

  1. K. Dou, B. Guo, and L. Kuang, “A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection,” Multimedia Tools and Applications, vol. 78, no. 19. pp. 26907–26926, 2019. doi: 10.1007/s11042-017-4352-3.
  2. A. Alsimry, K. Hussein Ali, and E. Wahab Abood, “A new approach for finding duplicated words in scanned Arabic documents based on OCR and SURF,” J. Basrah Res., no. 47, 2021. [Online]. Available: https://www.iasj.net/iasj/journal/260/issues.
  3. Farah Abdul-Hussain Badr, “secure data communications using cryptography and IPv6 steganography.pdf,” International Journal of Engineering & Technology, vol. 7, no. 4.19, pp. 624-628, 2018.
  4. H. M. Abdul-Nabi, E. S. Al-Shawi, and H. L. Hussain, “Hiding Three Images at one image by Using Wavelet Coefficients at Color Image,” Basrah Journal of Science (A), vol. 28, no. 1, pp. 58-73, 2010.
  5. Q. Su et al., “New Rapid and Robust Color Image Watermarking Technique in Spatial Domain,” IEEE Access, vol. 7, pp. 30398–30409, 2019. doi: 10.1109/ACCESS.2019.2895062.
  6. D. Singh and S. K. Singh, “DCT based efficient fragile watermarking scheme for image authentication and restoration,” Multimedia Tools and Applications, vol. 76, no. 1. pp. 953–977, 2017. doi: 10.1007/s11042-015-3010- x.
  7. N. R. N. Raj and R. Shreelekshmi, “Blockwise Fragile Watermarking Schemes for Tamper Localization in Digital Images,” 2018 International CET Conference on Control, Communication, and Computing, IC4 2018, pp. 441–446, 2018. doi: 10.1109/CETIC4.2018.8530950.
  8. K. Chitra and V. Prasanna, “A Dynamic Security Model for Visual Cryptography and Digital Watermarking,” Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018), pp 351–357, 2018.
  9. M. A. Ayu, T. Mantoro, and I. M. A. Priyatna, “Advanced watermarking technique to improve medical images’ security,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 5. pp. 2684–2696, 2019. doi: 10.12928/TELKOMNIKA.v17i5. 13292.
  10. E. Gul and S. Ozturk, “A novel hash function based fragile watermarking method for image integrity,” Multimedia Tools and Applications, vol. 78, no. 13. pp. 17701–17718, 2019. doi: 10.1007/s11042-018-7084-0.
  11. R. Sinhal, I. A. Ansari, and C. W. Ahn, “Blind Image Watermarking for Localization and Restoration of Color Images,” IEEE Access, vol. 8, pp. 200157–200169, 2020. doi: 10.1109/ACCESS.2020.3035428.
  12. R. Reyes-Reyes, C. Cruz-Ramos, V. Ponomaryov, B. P. Garcia-Salgado, and J. Molina-Garcia, “Color image self- recovery and tampering detection scheme based on fragile watermarking with high recovery capability,” Applied Sciences (Switzerland), vol. 11, no. 7. 2021. doi: 10.3390/app11073187.
  13. G. D. Su, C. C. Chang, and C. C. Chen, “A hybrid- Sudoku based fragile watermarking scheme for image tampering detection,” Multimedia Tools and Applications, vol. 80, no. 8. pp. 12881–12903, 2021. doi: 10.1007/s11042-020-10451-1.
  14. S. A. Alsuhibany, “Developing a Visual Cryptography Tool for Arabic Text,” IEEE Access, vol. 7, pp. 76573– 76579, 2019. doi: 10.1109/ACCESS.2019.2920858.
  15. S. A. Fadhil, A. K. Farhan, and A. H. Radie, “Visual Cryptography Techniques: Short Survey,” 4th Int. Iraqi Conf. Eng. Technol. Their Appl. IICETA 2021, pp. 276– 282, 2021, doi: 10.1109/IICETA51758.2021.9717352.
  16. N. Hamed and A. Yassin, “Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption,” Iraqi Journal for Electrical and Electronic Engineering, vol. 18, no. 1. pp. 71–81, 2022. doi: 10.37917/ijeee.18.1.9.
  17. O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8. pp. 166589–166611, 2020. doi: 10.1109/ACCESS.2020.3022779.
  18. L. Rakhmawati, Wirawan, and Suwadi, “Image Fragile Watermarking with Two Authentication Components for Tamper Detection and Recovery,” 2018 Int. Conf. Intell. Auton. Syst. ICoIAS 2018, pp. 35–38, 2018. doi: 10.1109/ICoIAS.2018.8494080.
  19. https://www.kaggle.com/datasets/pavansanagapati/ images-dataset