Browse > Article
http://dx.doi.org/10.5762/KAIS.2014.15.7.4516

Tamper Detection of Digital Images using Hash Functions  

Woo, Chan-Il (Dept. of Information and Communication Engineering, Seoil University)
Lee, Seung-Dae (Dept. of Electronic Engineering, Namseoul University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.15, no.7, 2014 , pp. 4516-4521 More about this Journal
Abstract
Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.
Keywords
Fragile Watermarking; Spatial Domain; Tamper Detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. M. Rad, A. Attar and R. E. Atani, "A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR," International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 6, no. 5, pp. 275-290, 2013. DOI: http://dx.doi.org/10.14257/ijsip.2013.6.5.25   DOI
2 G. Kaur, K. Kaur, "Image Watermarking using LSB," International Journal of Advanced Research in Computer Science and Sofrware Engineering, Vol. 3, no. 4, pp. 858-861, April 2013.
3 M. Wu, B. Liu, "Watermarking for image authentication," ICIP 98, Vol. 2, pp. 437-441, October 1998.
4 http://140.127.82.166/handle/987654321/15174
5 C. M. Wu, Y. S. Shin, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections," Optics and Photonics Journal 3, pp. 103-107, 2013. DOI: http://dx.doi.org/10.4236/opj.2013.32B026   DOI
6 H. Nyeem, W. Boles and C. Boyd, "Counterfeiting Attacks on Block-Wise Dependent Fragile Watermarking Schemes" in Proc. of the 6th International Conference on Security of Information and Networks, ACM Press and Digital Library, 2013. DOI: http://dx.doi.org/10.1145/2523514.2523530   DOI
7 P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: http://dx.doi.org/10.1109/ICIP.1998.723526   DOI
8 P. L. Lin, C. K. Hsieh and P. W. Huang, "A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery," Pattern Recognition, Vol. 38, no. 12, pp. 2519-2529, 2005. DOI: http://dx.doi.org/10.1016/j.patcog.2005.02.007   DOI   ScienceOn