Tampering Detection Algorithms: A Comparative Study

Similar documents
Wavelet-based Image Splicing Forgery Detection

Digital Watermarking Using Homogeneity in Image

Image Quality Estimation of Tree Based DWT Digital Watermarks

An Implementation of LSB Steganography Using DWT Technique

FPGA implementation of DWT for Audio Watermarking Application

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Forgery Detection using Noise Inconsistency: A Review

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

FPGA implementation of LSB Steganography method

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Image Forgery. Forgery Detection Using Wavelets

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Dynamic Collage Steganography on Images

Concealing Data for Secure Transmission and Storage

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Colored Digital Image Watermarking using the Wavelet Technique

Keywords Secret data, Host data, DWT, LSB substitution.

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Tampering and Copy-Move Forgery Detection Using Sift Feature

Image Forgery Detection Using Svm Classifier

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Introduction to Video Forgery Detection: Part I

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Block Wise Data Hiding with Auxilliary Matrix

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Authentication of grayscale document images using shamir secret sharing scheme.

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes

Color Image Compression using SPIHT Algorithm

An Enhanced Least Significant Bit Steganography Technique

AN EXPANDED-HAAR WAVELET TRANSFORM AND MORPHOLOGICAL DEAL BASED APPROACH FOR VEHICLE LICENSE PLATE LOCALIZATION IN INDIAN CONDITIONS

Transform Domain Technique in Image Steganography for Hiding Secret Information

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Local prediction based reversible watermarking framework for digital videos

Robust watermarking based on DWT SVD

GNE College, Ludhiana, Punjab, India

HSI Color Space Conversion Steganography using Elliptic Curve

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Improvement of Satellite Images Resolution Based On DT-CWT

Literature Survey on Image Manipulation Detection

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

Contrast Enhancement Based Reversible Image Data Hiding

Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Correlation Based Image Tampering Detection

A New Compression Method for Encrypted Images

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

Hiding And Encrypting Binary Images Using A Different Approach

Digital Image Forgery Detection using Wavelet Decomposition and Edge Detection

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A New Image Steganography Depending On Reference & LSB

A NEW SEMI-FRAGILE WATERMARKING SCHEME FOR AUTHENTICATION AND TAMPER LOCALIZATION IN REMOTE SENSING IMAGES

Blind Image Fidelity Assessment Using the Histogram

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Multiresolution Watermarking for Digital Images

Comparision of different Image Resolution Enhancement techniques using wavelet transform

A Reversible Data Hiding Scheme Based on Prediction Difference

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

International Journal of Advance Research in Computer Science and Management Studies

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Journal of mathematics and computer science 11 (2014),

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Convolutional Neural Network-based Steganalysis on Spatial Domain

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Laser Printer Source Forensics for Arbitrary Chinese Characters

ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies

An Improvement for Hiding Data in Audio Using Echo Modulation

A DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

An Integrated Image Steganography System. with Improved Image Quality

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Digital Image Forgery Identification Using Motion Blur Variations as Clue

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Source Camera Identification Forensics Based on Wavelet Features

Design of Various Image Enhancement Techniques - A Critical Review

A Modified Image Coder using HVS Characteristics

Visual Secret Sharing Based Digital Image Watermarking

Transcription:

International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study Suresh Gulivindala 1, Ch.Srinivasa Rao 2 1 Asst.Prof, Dept of ECE, GMR Institute of Technology, Rajam, A.P. INDIA. 2 Professor & Head, Dept of ECE, JNTUK University College of Engineering, Vizianagaram, A.P. INDIA. Abstract:- The reprehensible use of technology such as powerful editing software and sophisticated digital cameras leads to image tampering or manipulation. The tampered data is being illegally used and distributed through high-speed digital networks. Hence techniques to solve the problem of unauthorized copying, tampering, and multimedia data delivery through the internet are very much in demand. Information hiding, is the key issue, consists mainly of steganography and digital watermarking. Development of image tampering detection algorithms in active and passive methods became a significant research work. In this paper, comparative analysis on the performance of two algorithms such as 3LSB and DWT was reported. These two algorithms are designed in active method i.e. it uses digital watermarking in the background. Any tampering/modification on the watermarked image results in the change in the intensity levels, so in turn the coefficient values. The extraction procedure results in the watermark whose bit value reflects the respective changes. The 3LSB method proves to be superior to DWT method in terms of detection and localization. Keywords:- Image Tampering, 3LSB method, DWT, Authentication, Image Forgery I. INTRODUCTION Sophisticated digital cameras and advanced photo-editing tools help in creating good quality images and on the other hand digital image forgeries. Further, the high-speed digital networks are the backbone of illegal distribution and manipulation. There is no scope to trust image media since (maliciously) tampered images are often found in the Internet even published in newspapers. If we take this issue for granted, it may eventually be harmful for our digital world, especially for the credibility of news coverage. Many researchers have worked on image forensics and a number of image tampering detection techniques have been proposed in recent years [1-12]. Generally speaking, there are two types of approaches of image tampering detection: active and passive approaches. Passive approaches [3] do not require extra information and they can be considered blind with respect to the original image. These approaches rely on the extraction of some features from the image under test and, based on pre-defined rule or statistical thresholds, make a decision. Unlike the watermark and signature-based methods, the passive technology does not need any digital signature to be generated or to embed any watermark in advance. Block matching techniques are employed in passive technology for detecting the forged regions. Active systems [3] are based on watermarking methodologies for tampering detection. They are based on the insertion of some features extracted from the image into the image itself. During the authentication control, the detection of modification in the hidden data can be used for assessing modification of the original image. In active approach, the digital image requires pre-processing of image such as watermark embedding or signature generation, which would limit their application in practice. In this paper, comparative analysis on the performance of two algorithms such as 3LSB and DWT was reported. II. DISCRETE WAVELET TRANSFORM The 2-D Discrete Wavelet Transform is used to provide multiresolution representation of the original image [4]. By applying 2-D DWT [5-7] on an image, obtained coefficients can be classified into 4 types and shown in Fig.1: 1.HH Coefficients: Obtained by high-pass filtering in both directions (represent the diagonal features), 2.HL Coefficients: Obtained by high-pass filtering of the columns followed by low-pass filtering of the rows (represent the horizontal structures), 3. LH Coefficients: Obtained by low-pass filtering of the columns followed by high-pass filtering of the rows (represent the vertical structures) and 4.LL Coefficients: Obtained by low-pass filtering in both directions (represents approximation image). 82

Fig.1 Representation of 2-D Wavelet Transform at different levels. A. DWT METHOD Image Tamper Identification Procedure consists of i) watermark embedding and ii) watermark extraction. The embedding process can be described as follows: 1: Apply 1-Level DWT on an N*N cover image. 2: Divide the binary watermark into non-overlapping blocks of size 2*2. 3: Divide the HL sub band into non-overlapping blocks of size 4*4 and embed four watermark bits into the LSBs of the four coefficients in the reverse diagonal of each block, as shown in Fig.2. 4. Perform IDWT on the embedded image to obtain an image. The tampered watermarked image is processed to extract the binary watermark and is as follows: 1: Apply 1-Level DWT on an N*N tampered watermarked image. 2: Divide the HL sub-band into non-overlapping blocks of size 4*4 and extract four watermark bits from the LSBs of the four coefficients in the reverse diagonal of each block. 3: Construct the actual binary watermark image. Fig.2 Partitioning of DWT HL Coefficients into 4x4 blocks III. 3LSB METHOD Here 3 LSB Method [10] proposed by Sajjad Dadkhah et al. is considered and is given in Section III. Fig.3 illustrates dividing the image into 2*2 blocks and generating a 12-bit watermark for embedding into last three significant bits of each block. The watermark content which has 12-bit size have to be something that relate to each pixel of the block so in case of tampering in one of the pixels, this method can detect and localize the tampered blocks. In order to generate the 12bit watermark, first of all divide the cover image into non overlapping 2*2 blocks, the first 10bits are obtained by taking 5MSB s of the 1 st and 2 nd pixel values of the block. The remaining two bits are odd &even parities of the 10bits. The 12-bit watermark will be embedded into 3LSB of each pixel of the block as shown in Fig.4. Now the watermarked image has generated. If the image is tampered, that is identified by using watermark extraction process. In this by comparing the 12 bit watermark of tampered image and 12 bit watermark of original cover image we got the tampering locations. 83

Fig.3 Generation of 12-Bit Watermark Fig.4 Embedding 12-bit watermark into 3LSBs A. 3-LSB EMBEDDING ALGORITM 1: Consider a cover image of size 512*512 and partition the image into 2*2 blocks. Each block contains four elements (A1, A2, A3, and A4). 2: Consider the first 5MSB s of the elements A1, A2 (10bits). 3: To obtain the 12bit watermark we consider the last two digits as odd &even parity of 10bits. Even parity r=0 Cr=1 Odd parity r=1 Cr=0 4: Divide the 12bits into 4parts and replace each part in 3LSB s of the block Elements (A1, A2, A3, and A4). 5: Apply this procedure to all blocks of the image; the resultant image is watermarked image. B. 3-LSB EXTRACTION ALGORITHM 1: Consider watermarked image and cover image & divide each image into 2*2 blocks. 2: Extract the 3LSB s of the block elements of the watermarked image. 3: Extract the 12bit watermark by taking 5MSB s of first two elements of 2*2 block of cover image and remaining 2bits are even and odd parities. 4: Compare 12bit watermarks of cover image and watermarked image, if those are not equal then we can say that there is a tamper. C. 2-LEVEL TAMPER DETECTION ALGORITHM If watermarked image is tampered, 2-level tamper detection is used to detect the tampering. 1: Consider tampered watermarked image and cover image & divide each image into 2*2 blocks. 2: Extract the 3LSB s of the block elements of the Tampered watermarked image. 3: Extract the 12bit watermark by taking 5MSB s of first two elements of 2*2 block of cover image and remaining 2bits are even and odd parities. 4: Compare 12bit watermarks of cover image and watermarked image, if those are not equal then we can say that there is a tamper. 5: If tampering is not detected in LSB s comparison go to next step. 6: Compare 5MSB s of each element in cover image with tampered watermarked image. If they are not equal then tampering is done in the MSB s of the watermarked image. This method is called 2-level tamper detection. IV. RESULTS The standard images Lena-512x512, Cameraman-256x256, are considered as Cover image and watermark respectively. The 3LSB Method does not require any watermark image separately; it generates the watermark from the cover image itself. The watermarked image is tampered with different attacks (copy-move forgery, deletion attack). The two detection algorithms are capable of tamper detection, its location and the number of pixels or blocks tampered. Here the two algorithms are compared in terms of tampered region and localisation. The results are tabulated in Table.1 84

V. CONCLUSION Both the algorithms are capable of tamper detection and its localization as well gives the number of pixels that are being tampered. The experimental results demonstrate that 3-LSB method is superior to DWT based methods for collage type attacks. The 3-LSB method also detects exactly the image/portion which is being used to tamper the original. The 3-LSB method is basically a spatial approach but as the 12-bit watermark is self generated from the cover and embedded in the 2x2 blocks of the cover, the chances for intruder attacks are less. Table I: Results of tampering algorithms Cover Image Watermark Watermarked Image Tampered Watermarked Image Extracted Watermark Tamper Localisation No. of Pixels Tampered 3 L S B Self generating 4352 D W T 4347 3 L S B Self generating 872 D W T 730 85

REFERENCES [1]. Hany farid, Image Forgery Detection A Survey IEEE Signal processing Magazine, March 2009, pp.16-25. [2]. D.Cozzolino, G.poggi, C.Sansone and Luisa Verdoliva, A Comparative Analysis of Forgery Detection Algorithms SSPR & SPR 2012, LNCS 7626, pp.693-700 2012. [3]. P.Deshpande, P.Kanikar, Pixel Based Image Forgery Detection Techniques International Journal of Engineering Research and Applications, VOl.2, Issue 3, May-June 2012, pp.539-543. [4]. R. Dugad, K. Ratakonda and N. Ahuja, A new wavelet-based scheme for watermarking images, Proc. IEEE Intl. Conf. on Image Processing, CIP 98,Chicago, IL, USA, Oct. 1998, 419-423. [5]. M.E.Hajji, H.ouaha, K.Afdel, H.Douzi, Multiple Watermark Authentication and Tamper Detection using Mixed Scales DWT, International Journal of Computer Applications, Vol.28, No.6, August- 2011. [6]. Saiqa Khan, Arun Kulkarni, An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform International Journal on Computer Science and Engineering, Vol.2, No.5, 20120, 1801-1806. [7]. Yanjun Cao, T.Gao, Qunting Yang A robust detection algorithm for copy-move forgery in digital images Forensic International 214 (2012) 33-43. [8]. Anil Dada Warbhe, R.V.Dharaskar, Blind Method for Image forgery detection: A tool for digital image forensics NCIPET-2012, Proceedings published by International Journal of Computer Applications. [9]. Shuiming Ye, Qibin Sun and Ee-Chien Chang, Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact, ICME 2007, pp.12-16. [10]. Sajjad Dadkhah, Azizah Abd Manaf and Somayeh Sadeghi, Efficient Digital Image Authentication and Tamper Localisation Using 3LSB Watermarking International Journal of Computer Science Issues, Vol.9, Issue.1, No.2, January 2012. [11]. Granty R.E.J, Aditya T.S, Madhu S.S, Survey on Passive methods of image tampering detection INCOCCI, 2010, E-ISBN : 978-81-8371-369-6. [12]. Pin Zhang, Xiangwei Kong, Detecting Image Tampering using Feature fusion, International Conference on Availability, Reliability and Security, 2009, pp.335-340. 86