Abstract

The usage of images in different fields has increased dramatically, especially in medical image analysis and social media. Many risks can threaten the integrity and confidentiality of digital images transmitted through the internet. As such, the preservation of the contents of these images is of the utmost importance for sensitive healthcare systems. In this paper, the researchers propose a block-based approach to protect the integrity of digital images by detecting and localizing forgeries. It employs a visual cryptography-based watermarking approach to provide the capabilities of forgery detection and localization. In this watermarking scheme, features and key and secret shares are generated. The feature share is constructed by extracting features from equal-sized blocks of the image by using a Walsh transform, a local binary pattern and a discrete wavelet transform. Then, the key share is generated randomly from each image block, and the secret share is constructed by applying the XOR operation between the watermark, feature share and key share. The CASIA V 1.0 and SIPI datasets were used to check the performance and robustness of the proposed method. The experimental results from these datasets revealed that the percentages of the precision, recall and F1 score classification indicators were approximately 97% for these indicators, while the percentages of the TAF and NC image quality indicators were approximately 97% and 96% after applying several known image processing and geometric attacks. Furthermore, the comparative experimental results with the state-of-art approaches proved the robustness and noticeable improvement in the proposed approach for the detection and localization of image forgeries in terms of classification and quality measures.

Highlights

  • Publisher’s Note: MDPI stays neutralNowadays, millions of images and videos are processed and transmitted by people over the internet

  • Liu and Wu [43] utilized a visual cryptography (VC) algorithm, discrete wavelet transform (DWT), error correction codes and noise-removing techniques to develop a watermarking approach to protect the copyright of multiple images and multiple users

  • Amiri and Moghaddam [44] proposed a novel watermarking scheme to create feature shares from cover images by using VC, singular value decomposition (SVD), DWT and scale invariant feature transform (SIFT). These feature shares were used with watermarks and private keys to compose the secret share

Read more

Summary

Introduction

Publisher’s Note: MDPI stays neutralNowadays, millions of images and videos are processed and transmitted by people over the internet. It is very necessary and imperative to develop forgery detection tools to identify different kinds of malicious modifications of images [2]. Image integrity authentication, digital signatures, hash codes, watermarking and cryptography are the basic tools which are used to detect and localize the forgeries in the digital images [4]. There are two types of image authentication techniques: active [5] and passive [6]. The active techniques use the watermarks embedded inside the image to check the integrity [7,8,9,10,11], while the passive techniques do not use any prior knowledge about the image to detect forgery [12,13,14,15,16]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call