A Robust Cross-Channel Image Watermarking Technique for Tamper Detection and its Precise Localization

Muhammad Ashraf;Adnan Nadeem;Oussama Benrhouma;Muhammad Sarim;Kashif Rizwan;Amir Mehmood
{"title":"A Robust Cross-Channel Image Watermarking Technique for Tamper Detection and its Precise Localization","authors":"Muhammad Ashraf;Adnan Nadeem;Oussama Benrhouma;Muhammad Sarim;Kashif Rizwan;Amir Mehmood","doi":"10.1109/OJCS.2025.3589948","DOIUrl":null,"url":null,"abstract":"Several watermarking techniques have been suggested to safeguard the integrity of transmitted images in public video surveillance applications. However, these techniques have a critical drawback in their embedding schemes: the watermark is limited to residing in a narrow traceable space to avoid fidelity issues. Such a protection layer can be evaluated or forcefully removed to breach data security. Once the protection layer (watermark) is removed, a watermarking algorithm cannot pinpoint the falsified regions in affected images and gives a binary answer. Consequently, attackers can present the falsification of visual elements as a non-malicious perturbation. Such a type of attack poses a serious security challenge. This study introduces a novel cross-channel image watermarking technique that randomly scatters the watermark pattern across a 24-bit image structure so that no emergence of embedding signatures and fidelity issues occurs after the process. Chaotic systems are employed to leverage their sensitivity to initial conditions and control parameters, resulting in high confusion and diffusion properties in the proposed scheme. The protection layer is completely intractable as it is randomly scattered in the entire RGB space, making it very hard to remove without leaving a clear footprint in affected images. This method creates a good balance between security and imperceptibility, it effectively detects and localizes falsified regions in tampered images, and maintains this ability until clear evidence of a removal attempt emerges in histograms. This property makes proposed algorithm a preferred choice for data integrity protection; it achieved an average F1-score of 0.97 for tamper detection.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1202-1213"},"PeriodicalIF":0.0000,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11081476","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Computer Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11081476/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Several watermarking techniques have been suggested to safeguard the integrity of transmitted images in public video surveillance applications. However, these techniques have a critical drawback in their embedding schemes: the watermark is limited to residing in a narrow traceable space to avoid fidelity issues. Such a protection layer can be evaluated or forcefully removed to breach data security. Once the protection layer (watermark) is removed, a watermarking algorithm cannot pinpoint the falsified regions in affected images and gives a binary answer. Consequently, attackers can present the falsification of visual elements as a non-malicious perturbation. Such a type of attack poses a serious security challenge. This study introduces a novel cross-channel image watermarking technique that randomly scatters the watermark pattern across a 24-bit image structure so that no emergence of embedding signatures and fidelity issues occurs after the process. Chaotic systems are employed to leverage their sensitivity to initial conditions and control parameters, resulting in high confusion and diffusion properties in the proposed scheme. The protection layer is completely intractable as it is randomly scattered in the entire RGB space, making it very hard to remove without leaving a clear footprint in affected images. This method creates a good balance between security and imperceptibility, it effectively detects and localizes falsified regions in tampered images, and maintains this ability until clear evidence of a removal attempt emerges in histograms. This property makes proposed algorithm a preferred choice for data integrity protection; it achieved an average F1-score of 0.97 for tamper detection.
一种鲁棒跨通道图像水印篡改检测技术及其精确定位
在公共视频监控应用中,为了保证传输图像的完整性,提出了几种水印技术。然而,这些技术在其嵌入方案中有一个关键的缺点:水印被限制在一个狭窄的可跟踪空间中,以避免保真度问题。这样的保护层可以被评估或强制移除以破坏数据安全。一旦去除了水印保护层,水印算法就无法精确定位受影响图像中的伪造区域,只能给出一个二值解。因此,攻击者可以将视觉元素的伪造呈现为非恶意扰动。这种类型的攻击构成了严重的安全挑战。本研究提出了一种新的跨通道图像水印技术,该技术将水印模式随机分散在24位图像结构中,从而不会出现嵌入签名和保真度问题。混沌系统利用其对初始条件和控制参数的敏感性,使得该方案具有较高的混沌和扩散特性。保护层是完全难以处理的,因为它随机地分散在整个RGB空间中,因此很难在不在受影响的图像中留下清晰足迹的情况下删除它。该方法在安全性和不可感知性之间取得了良好的平衡,它有效地检测和定位篡改图像中的伪造区域,并保持这种能力,直到在直方图中出现明显的删除企图的证据。这一特性使该算法成为数据完整性保护的首选算法;篡改检测的平均f1得分为0.97。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
12.60
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信