Abstract
Detection and restoration of greatly tampered images is an important albeit difficult problem. Two schemes for the detection of tampered areas in images and their restoration have been presented. One of them works in the spatial domain and implements a quadruple watermarking approach. A watermark is constructed from four different parts of the image such that a filtered version of the image intensities contained in each of these parts is embedded identically in four other regions of the image. These regions are decided by a mapping algorithm. The advantage of this approach is that even if three of the four regions are tampered, the watermark from the untampered region can be used to reconstruct the three tampered regions. The chief motivation behind the quadruple scheme is the restoration of an image which has suffered tampering on a really large scale, upto 75%. The other proposed algorithm uses wavelet decomposition, based on which, two different watermarks are embedded. These serve two different purposes, one being tamper detection, while the second is restoration of the tampered area. They are embedded in non-overlapping regions of the wavelet transformed image. This algorithm is designed to obtain very good quality restoration and works well for tampering less than 50% of the total image area. The performance of both these algorithms has been examined using images from the entire USC-SIPI database. Comparison has been made with a well known existing approach. The superiority of the proposed approaches is evident from the plots, figures and tables presented.
Similar content being viewed by others
References
Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and faber-schauder wavelet. AEU - Int J Electron Commun 79:207–218. https://doi.org/10.1016/j.aeue.2017.06.001
Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60. https://doi.org/10.1016/j.displa.2017.01.001
Chuang J-C, Hu Y-C, Lo C-C, Chen W-L (2013) Grayscale image tamper detection and recovery based on vector quantization. International Journal of Security and its Applications 7(6):209–228. https://doi.org/10.14257/ijsia.2013.7.6.22
Criminesi A, Prez P, Toyama K (2004) Region filling and object removal by exemplar-based image inpainting. IEEE Trans Image Process 13(9):1200–1212. https://doi.org/10.1109/TIP.2004.833105
Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210. https://doi.org/10.1016/j.image.2014.09.001
Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In: Proceedings of International Conference on Image Processing, (Cat. 99CH36348), vol 3, Kobe, pp 25–28. https://doi.org/10.1109/ICIP.1999.817228
He HJ, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7:1185–196. https://doi.org/10.1109/TIFS.2011.2162950
Hong W, Chen M, Chen TS (2017) An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Processing: Image Communication 58:111–122. https://doi.org/10.1016/j.image.2017.07.001
Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743. https://doi.org/10.1016/j.optcom.2009.12.073
Hsu C-S, Tu S-F (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296. https://doi.org/10.1016/j.measurement.2016.03.053
Izquierdo E, Guerra V (2003) An ill-posed operator for secure image authentication. IEEE Trans Circ Syst Video Technol 13(8):842–852. https://doi.org/10.1109/TCSVT.2003.815961
Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180. https://doi.org/10.1109/5.771070
Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recognit 41(11):3497–3506. https://doi.org/10.1016/j.patcog.2008.05.003
Li K-F, Chen T-F, Wu S-C (2001) Image tamper detection and recovery system based on discrete wavelet transformation. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), Victoria, BC, Canada, vol 1, pp 164-167. https://doi.org/10.1109/PACRIM.2001.953548
Lin C-C, Huang Y, Tai W-L (2017) A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimedia Tools and Applications 76(1):463–488. https://doi.org/10.1007/s11042-015-3059-6
Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38(12):2519–2529. https://doi.org/10.1016/j.patcog.2005.02.007
Liu L, Li S, Chen Y, Wang G (2018) X-GANs:, Image Reconstruction Made Easy for Extreme Cases. arXiv:1808.04432
Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image R 22(2):187–200. https://doi.org/10.1016/j.jvcir.2010.12.005
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293. https://doi.org/10.1016/j.sigpro.2017.03.033
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. Journal of Visual Communication and Image Representation 38:775–789. https://doi.org/10.1016/j.jvcir.2016.04.023
Singh D, Singh SK (2017) DCT Based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications 76(1):953–977. https://doi.org/10.1007/s11042-015-3010-x
Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9):165–175
Song J, Guo Y, Gao L, Li X, Hanjalic A, Shen H-T (2018) From deterministic to generative: Multimodal stochastic RNNs for video captioning. IEEE Transactions on Neural Networks and Learning Systems, pp 1–12. https://doi.org/10.1109/TNNLS.2018.2851077
Song J, Zhang H, Li X, Gao L, Wang M, Hong R (2018) Self-supervised video hashing with hierarchical binary auto-encoder. IEEE Trans Image Process 27 (7):3210–3221
Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self-recovery. J Vis Commun Image Represent 49:164–176. https://doi.org/10.1016/j.jvcir.2017.09.001
Sreenivas K, Kamkshi Prasad V (2008) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9 (7):1193–1218. https://doi.org/10.1007/s13042-017-0641-4
Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU - Int J Electron Commun 78:114–123. https://doi.org/10.1016/j.aeue.2017.05.027
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308. https://doi.org/10.1016/j.image.2012.12.003
USC-SIPI Image Database, University of Southern California. Available online at http://sipi.usc.edu/database
Utku -CM, Sharma G, Saber E, Murat -TA (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595. https://doi.org/10.1109/TIP.2002.1014990
Vafaei M, Mahdavi-Nasab H (2013) A novel digital watermarking scheme using neural networks with tamper detection capability. Journal of Basic and Applied Sciences Research 3(4):577–587
Wang H, Chen W, Lee P (2015) Image tamper detection and recovery based on dilation and chaotic mixing. Computer Science and Information Technology 3(4):127–132. https://doi.org/10.13189/csit.2015.030406
Wang X, Gao L, Wang P, Sun X, Liu X (2018) Two-stream 3-D convNet fusion for action recognition in videos with arbitrary size and length. IEEE Transactions on Multimedia 20(3):634–644. https://doi.org/10.1109/TMM.2017.2749159
Yeung M, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of International Conference on Image Processing, vol 2. Santa Barbara, pp 680–683. https://doi.org/10.1109/ICIP.1997.638587
Zhang J, Zhang Q, Lv H (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik - International Journal for Light and Electron Optics 124(23):6367–6371. https://doi.org/10.1016/j.ijleo.2013.05.040
Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Transactions on Multimedia 10(8):1490–1499. https://doi.org/10.1109/TMM.2008.2007334
Zhu X, Ho A-T-S, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528. https://doi.org/10.1016/j.image.2007.03.004
Acknowledgements
The authors would like to thank Indian Statistical Institute for providing funds for the work carried out for this article vide the Project Blind quality assessment of images, tamper detection and correction.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sarkar, D., Palit, S., Som, S. et al. Large scale image tamper detection and restoration. Multimed Tools Appl 79, 17761–17791 (2020). https://doi.org/10.1007/s11042-020-08669-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08669-0