Skip to main content
Log in

A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images

  • 1163: Large-scale multimedia signal processing for security and digital forensics
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image sharing in open and public communication infrastructure is vulnerable. There are several solutions articulated by worldwide researchers for secure image transmission. However, with the increasing computing capacity and capability, the currently available security solutions are being breached. This yearns for more robust solutions. The significant contribution of the proposed work involves in the generation of a new hash algorithm for the entire RGB image of size 256 × 256 with no Region of Interest (RoI) restriction. This paper mainly focuses on integrity verification, tamper detection, localisation of the tampered area and its restoration. The whole image is considered as sensitive data for which one-way integrity verification code is generated block-wise to locate the areas of tampering. Integrity validation phase will compare the received digest and generated the digest from the received image. Blocks which are failed to pass in integrity validation will undergo the recovery process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdelhakim A, Saleh HI, Abdelhakim M (2019) Fragile watermarking for image tamper detection and localisation with effective recovery capability using K-means clustering. Multimed Tools Appl 78:32523–32563. https://doi.org/10.1007/s11042-019-07986-3

    Article  Google Scholar 

  2. Al-Otum HM (2019) Wavelet packets-based watermarking with preserved high color image quality and enhanced robustness for copyright protection applications. Multimed Tools Appl 78:2199–2225. https://doi.org/10.1007/s11042-018-6328-3

    Article  Google Scholar 

  3. Al-Qershi OM, Khoo BE (2019) Enhanced block-based copy-move forgery detection using k-means clustering. Multidim Syst Sign Process 30:1671–1695

    Article  Google Scholar 

  4. Asadi S, Nilashi M, Husin ARC, Yadegaridehkordi E (2017) Customers perspectives on adoption of cloud computing in banking sector. Inf Technol Manag 18:305–330

    Article  Google Scholar 

  5. Belferdi W, Behloul A, Noui L (2019) A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidim Syst Sign Process 30:1093–1112. https://doi.org/10.1007/s11045-018-0597-x

    Article  MathSciNet  MATH  Google Scholar 

  6. Bhattacharya A, Palit S (2018) Blind quality assessment of image and video based on fragile watermarking and robust features. Multidim Syst Sign Process 29:1679–1709

    Article  Google Scholar 

  7. Boussif M, Aloui N, Cherif A (2018) Secured cloud computing for medical data based on watermarking and encryption. IET Netw 7:294–298. https://doi.org/10.1049/iet-net.2017.0180

    Article  Google Scholar 

  8. Chakravarthy S, Jagannathan MA, Ranjani JJ, Baluswamy B, Kadry S (2019) An optimised hierarchical encryption technique for tamper recognition. Multimed Tools Appl 78:18693–18712. https://doi.org/10.1007/s11042-019-7265-5

    Article  Google Scholar 

  9. Gao G, Cui Z, Zhou C (2018) Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Process Lett 25:1099–1103. https://doi.org/10.1109/LSP.2018.2844562

    Article  Google Scholar 

  10. Haramoto H, Matsumoto M (2019) Checking the quality of approximation of p-values in statistical tests for random number generators by using a three-level test. Math Comput Simul 161:66–75

    Article  MathSciNet  Google Scholar 

  11. Hu YC, Lo CC, Chen WL (2016) Probability-based reversible image authentication scheme for image demosaicking. Futur Gener Comput Syst 62:92–103. https://doi.org/10.1016/j.future.2016.04.001

    Article  Google Scholar 

  12. Jafari Barani M, Yousefi Valandar M, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik (Stuttg) 187:205–222. https://doi.org/10.1016/j.ijleo.2019.04.074

    Article  Google Scholar 

  13. Kantarci B, He S, Song H et al (2016) Multimedia recommendation and transmission system based on cloud platform. Futur Gener Comput Syst 70:94–103. https://doi.org/10.1016/j.future.2016.06.015

    Article  Google Scholar 

  14. Kaur C, Kanwal N (2019) An analysis of image forgery detection techniques. Stat Optim Inf Comput 7:486–500

    Article  MathSciNet  Google Scholar 

  15. Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11–29. https://doi.org/10.1016/j.jnca.2016.05.010

    Article  Google Scholar 

  16. Korus P (2017) Digital image integrity – a survey of protection and verification techniques. Digit Signal Process A Rev J 71:1–26. https://doi.org/10.1016/j.dsp.2017.08.009

    Article  MathSciNet  Google Scholar 

  17. Laouamer L, Tayan O (2018) Performance evaluation of a document image watermarking approach with enhanced tamper localization and recovery. IEEE Access 6:26144–26166. https://doi.org/10.1109/ACCESS.2018.2831599

    Article  Google Scholar 

  18. Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6:445. https://doi.org/10.1049/iet-ipr.2011.0574

    Article  MathSciNet  Google Scholar 

  19. Liu Y, You Z, Gao T (2020) Lossless image hierarchical recovery based on POB number system. Signal Process 167:107293

    Article  Google Scholar 

  20. Prakash CS, Kumar A, Maheshkar S, Maheshkar V (2018) An integrated method of copy-move and splicing for image forgery detection. Multimed Tools Appl 77:26939–26963. https://doi.org/10.1007/s11042-018-5899-3

    Article  Google Scholar 

  21. Rakhmawati L, Suryani T, Wirawan W et al (2019) Exploiting self-embedding fragile watermarking method for image tamper detection and recovery. Int J Intell Eng Syst 12:62–70. https://doi.org/10.22266/ijies2019.0831.07

    Article  Google Scholar 

  22. Rukhin A, Soto J, Nechvatal J (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Nist Spec Publ 22:1/1--G/1

    Google Scholar 

  23. Singh D, Singh SK (2019) Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimed Tools Appl 78:4197–4215. https://doi.org/10.1007/s11042-017-5454-7

    Article  Google Scholar 

  24. Singh P, Raman B, Agarwal N, Atrey PK (2017) Secure cloud-based image tampering detection and localisation using POB number system. ACM Trans Multimed Comput Commun Appl 13:23–23. https://doi.org/10.1145/3077140

    Article  Google Scholar 

  25. Soni B, Das PK, Thounaojam DM (2018) CMFD: a detailed review of block based and key feature based techniques in image copymove forgery detection. IET Image Process 12:167–178. https://doi.org/10.1049/iet-ipr.2017.0441

    Article  Google Scholar 

  26. Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidim Syst Sign Process 29:1055–1074

    Article  MathSciNet  Google Scholar 

  27. Teerakanok S, Uehara T (2019) Copy-move forgery detection: a state-of-the-art technical review and analysis. IEEE Access 7:40550–40568. https://doi.org/10.1109/ACCESS.2019.2907316

    Article  Google Scholar 

  28. Walia S, Kumar K (2019) Digital image forgery detection: a systematic scrutiny. Aust J Forensic Sci 51:488–526

    Article  Google Scholar 

  29. Wang X-Y, Wang C, Wang L, Jiao LX, Yang HY, Niu PP (2020) A fast and high accurate image copy-move forgery detection approach. Multidim Syst Sign Process 31:857–883. https://doi.org/10.1007/s11045-019-00688-x

    Article  MATH  Google Scholar 

  30. Xiang Y, Xiao D, Wang H, Li X (2019) A secure image tampering detection and self-recovery scheme using POB number system over cloud. Signal Process 162:282–295

    Article  Google Scholar 

  31. Zhang Z, Wang C, Zhou X (2018) A survey on passive image copy-move forgery detection. J Inf Process Syst 14:6–31. https://doi.org/10.3745/JIPS.02.0078

    Article  Google Scholar 

  32. Zhang R, Xiao D, Chang Y (2018) A novel image authentication with tamper localization and self-recovery in encrypted domain based on compressive sensing. Secur Commun Netw 2018:Article ID 1591206, 15 pages–Article ID 1591215. https://doi.org/10.1155/2018/1591206

    Article  Google Scholar 

  33. Zheng L, Zhang Y, Thing VLL (2019) A survey on image tampering and its detection in real-world photos. J Vis Commun Image Represent 58:380–399. https://doi.org/10.1016/j.jvcir.2018.12.022

    Article  Google Scholar 

  34. Zhu S, Ma Y, Lin J, et al (2016) More powerful and reliable second-level statistical randomness tests for NIST SP 800–22. In: International Conference on the Theory and Application of Cryptology and Information Security. pp. 307–329

Download references

Acknowledgements

Authors thank Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chidambaram, N., Raj, P., Thenmozhi, K. et al. A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multimed Tools Appl 80, 23359–23375 (2021). https://doi.org/10.1007/s11042-020-10210-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10210-2

Keywords

Navigation