Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance
© Shan Suthaharan. 2010
Received: 21 April 2010
Accepted: 23 September 2010
Published: 11 October 2010
An efficient fragile image watermarking technique for pixel level tamper detection and resistance is proposed. It uses five most significant bits of the pixels to generate watermark bits and embeds them in the three least significant bits. The proposed technique uses a logistic map and takes advantage of its sensitivity property to a small change in the initial condition. At the same time, it incorporates the confusion/diffusion and hashing techniques used in many cryptographic systems to resist tampering at pixel level as well as at block level. This paper also presents two new approaches called nonaggressive and aggressive tamper detection algorithms. Simulations show that the proposed technique can provide more than 99.39% tamper detection capability with less than 2.31% false-positive detection and less than 0.61% false-negative detection responses.
Fragile image watermarking has been proposed to authenticate digital images and detect tampering. In general, watermarks are generated from the most significant bits (MSB) and then embedded into the least significant bits (LSB) of the pixels while maintaining the image quality. The fragile image watermarking schemes also provide a procedure (or rules) to detect tampering at pixel level or block level. They assume the attacker's goal is not to change the watermark in the LSBs but to modify the MSBs so that the watermark generation algorithm produces the same watermarks. As image quality is also of paramount importance to fragile image watermarking schemes, more MSBs are used for watermark generation than the number of LSBs used for watermark embedding. It leads to many-to-one mapping between MSBs and LSBs and provides the attackers an opportunity to have more alternative MSBs for the same watermark, and this makes the watermarking fragile.
One of the original fragile image watermarking techniques was proposed in 1995 by Walton , and it is a 7MSB:1LSB technique (i.e., it uses 7 MSBs for watermark generation and 1 LSB for watermark embedding). It is a blockwise technique and it cannot detect pixel-level tampering. This drawback is called a localization problem and it was reported by Fridrich in 2002 . Subsequently, fragile watermarking techniques have been developed to address localization problem [3–5]. Recently, Zhang and Wang proposed two related 5MSB:3LSB fragile watermarking techniques [6, 7]. The first method is a statistical technique which is capable of detecting pixel-level tampering if the tampered area is small. The second one improves the tamper detection capability for a larger area by incorporating a hybrid (blockwise and pixelwise) mechanism. However, the use of block information reduces its tamper resistance capability. At the same time, chaotic map-based fragile watermark has been proposed to improve both tamper resistance and detection capabilities. In , the difference between the image and a chaotic map is used along with pixel pairs for watermark generation and embedding. It is a 7MSB:1LSB technique and enhances tamper resistance more than tamper detection (in this scheme, the localization is restricted to pixel pairs). In , a blockwise 7MSB:1LSB fragile watermarking technique is proposed using two chaotic maps, one to select pixel locations for embedding and the other to generate watermarks. In this scheme, the localization is restricted to pixel blocks. In , a composite chaotic iterative function is used along with a 7-MSB seed value to generate chaotic sequence. The chaotic sequence is used to choose a bit for watermark from the 7 MSBs. It is also a 7MSB:1LSB technique and provides pixel-level tamper detection with the detection rate of only 50%.
This paper proposes a 5MSB:3LSB technique that uses logistic map and confusion/diffusion and hashing cryptographic techniques to improve tamper detection and resistance capabilities. It also uses a key and pseudorandom number generator to select secure pixels for watermark embedding. The confusion process is used to induce complexity in the relation map between the distribution of the watermark and the value of the user-defined key. Similarly, the diffusion process is used to dissipate the image property displayed in the 5MSBs of a pixel over a long-range statistics of the watermark using the logistic-map. The chaotic behavior of the logistic-map is also used as hashing mechanism to generate a set of 3-bits watermarks. This proposed technique is discussed in Section 2. This paper also proposes new concepts called nonaggressive (NgTDM) and aggressive (AgTDM) scenarios for efficient tamper detection and these scenarios are presented in Section 3 of this paper. Simulation results and findings are presented in Section 4. A conclusion is also presented in Acknowledgement.
2. Proposed Watermarking Scheme
In parallel, WMG generates 3-bit watermark from the 5MSBs of each pixel using the same logistic map and the key . The modules MET1 and MET2 use the watermarks (extracted and generated) to detect tampered pixels. MET1 uses a nonaggressive approach; hence, it is possible to have false-negative pixels in the detection results. A tampered pixel that is detected as not-tampered is called false-negative pixel. MET2 uses an aggressive approach and it artificially increases false-positive pixels in the detection results. A not-tampered pixel that is detected as tampered is called false-positive pixel. Combining these two detection results, the DET detects tampered pixels with very high accuracy.
2.1. Watermark Generation and Embedding Process
Suppose is the original image and is its exact copy image. The copy image is used in the process of generating 3-bit watermarks and the 3LSB of the original image is replaced with the watermark. Now suppose P contains 8N pixels and the gray value of its ( , )th pixel is denoted by , where , , and . Let us denote the bits of the pixel by ( , , , , , , , ); then the first 5 bits (left to right) are the most significant bits (MSB) and the last three bits are the least significant bits (LSB). Using the modules in Figure 1(a), the proposed watermark generation and embedding processes are explained step by step in this section.
In homogeneous image regions, it is likely high that the majority of the pixels have the same intensity values and hence the majority of the fragile watermarks generated in that region will be the same too. To address this problem, the bits of the copy image are pseudorandomly modified using the key . Modifying this low-significant bit of the MSB will help to generate fragile watermarks that differ between homogeneous regions with respect to their intensity values. It is important to note that the homogeneous regions are not identified separately and treated differently in this step; instead the modification of the 4th bits of all the pixels in the image takes care of the stated security problem associated with the homogeneous regions.
Step 2 :.
In this step, LSBs of the gray values are replaced by bits 0 so that the watermarks to be generated for each pixel depend only on the MSBs of the corresponding pixel. Let us denote the modified image as and its gray value as , where = .
Step 3 :.
Although the runs test shows unpredictability around , a large value (i.e., ) is arbitrarily selected to guarantee the unpredictability for many images. From the corresponding pixels in these three images the bits for the intermediate watermark are generated. This process provides a hashing mechanism to the proposed approach. The hashing can be done in many ways but in the proposed approach we select the 6th bit (and 3rd bit in Step 5) of the pixel of the three images to map the corresponding 5MSBs that were used to generate these three images. Hence if the attacker wants to tamper the image he or she should maintain the pattern by modifying the image such that it gives the same bits at these bit positions for the three images. We selected 3rd and 6th bits because they form patterns based on the following: (i) they divide the bit positions equally, that is, 1 and 2; 4 and 5, and 7 and 8, (ii) the 3rd bit and below are used for watermarking, and (iii) the 6th bit and above are used for image understanding . The intermediate watermark bits are denoted by , , and .
Step 4 :.
A key is used to pseudorandomly permute the pixels of image . The permutated image shows a noise-like structure. The noise-like image is divided into 8 partitions such that each partition has the same number of pixels. The LSBs of the pixels in partition 1 are replaced with bit (0,0,0); the LSBs of the pixels in partition 2 are replaced with bit (0,0,1), and so on. Using the same key, the permutation pixels are reassigned to their original positions. This process assigns the three bits of either (0,0,0), (0,0,1), (0,1,0), (0,1,1), (1,0,0), (1,0,1), (1,1,0), or (1,1,1) to the LSBs with equal probability. The pixels of this modified image are denoted by .
Step 5 :.
Three consecutive integers , and are selected from this chaotic sequence. Using these three integers, their 3rd bits are selected to obtain 3 bits , and .
Step 6 :.
The logical operator represents the exclusive OR. Steps 1 through to 6 provide the watermark generation process in WMG module and they provide fragile watermark through confusion, diffusion, and hashing cryptographic techniques. (5) gives us 3 watermark bit planes , and where bit of is and . We have bits in all and these bits will be pseudorandomly mixed using the key and embedded into the 3 LSBs of the original image . This will provide additional cryptographic strength via this extra confusion process. The watermarked image of is denoted by and its pixel is denoted by .
2.2. Complexity and Tamper Resistance
Tamper resistance measures the difficulty level of finding another pixel for a pixel within the same block, another homogeneous region for a homogeneous region in the same image, or another block for a block in the same image (or a different image) for replacement (tampering) by the attacker without altering the watermark while maintaining the quality of the image. Hence we quantify the tamper resistance as the probability (let us denote it by TRP in this paper) of failure of finding replacement pixels or blocks by random guess or systematic approach by an attacker. Thus, Step 1 is carried out to resist tampering in homogeneous regions; Step 2 is carried out to make the 3 LSB-bit watermark dependent on the 5MSB-bits and fragile; Step 3 is carried out to make the fragile watermarks independent of each other; Steps 4 and 5 are to eliminate the statistical property of the image present in the watermark; Step 6 is carried out to resist tampering in any part of the image. It means that the statistical properties, such as the frequency count of similar blocks or regions and local variance and mean of a block or an image region should not be noticeable in the watermark, because it will help the attacker to guess the pixel, image block, or image region for tampering.
2.3. Pixel-Level Tamper Detection
If we denote = then any of the -values (000000), (000011), (001100), (110000), (111100), (110011), (001111), and (111111) indicates no-tampering of pixel. It gives (where ) and as a result we get the value of , (i.e., indicates no-tampering of pixel). For other 56 -values and it indicates tampering of pixel. Hence if a pixel is detected as tampered by this approach it is 100% accurate. However, if a pixel is detected as not tampered then it is possible that the pixel is tampered. This is called false-negative detection and it occurs because MSBs are mapped to watermarks, which is equivalent to mapping 4 MSB symbols to 1 LSB symbol and thus it facilitates tampering.
It is important to note that the matching relationships between and in , and and in are independent of pixel tampering. These relationships are included in the AgTDM to artificially increase the false- positive tamper detection (in turn this will increase actual tampered pixel detection). Note that this is one of the novelties of the technique.
Note that if a pixel is detected as tampered by NgTDM, then it is not possible for AgTDM to detect it as a not-tampered pixel; hence, no rule is considered for this case.
2.4. Generalized Approach
The proposed 5MSB:3LSB technique can be easily generalized to MSB:(8- )LSB due to its simplicity. This generalization will lead to a trade-off between the image quality (i.e., PSNR value) and tamper resistance (i.e., TRP value). For example, if 4MSB:4LSB approach is selected we can certainly improve the tamper resistance capability (i.e., high TRP), but the quality of the image formed by the original 4MSB is not acceptable (low PSNR). Similarly, if the 6MSB:2LSB is selected the quality of the image can certainly be improved (high PSNR) but the tamper resistance capability will be very low (i.e., low TRP). Also MSBs are mapped to watermarks causing significant increase in the false-negative pixels. Hence 5MSB:3LSB approach is preferable than other methods including 4MSB:4LSB and 6MSB:2LSB.
3. Simulation Results
Simulation results have been obtained using several images but the results of "Biltmore Estate" image are presented in Figures 3(a)–3(f). The results collated from several images are also presented in Table 1. The actual size of the images considered in this paper is pixels. Figures 3(a) and 4(a) show the original "Biltmore Estate" and "UNCG" images and they are used to watermark using both the proposed (SS) and Zhang-Wang (ZW)  approaches. The Matlab code provided by . Zhang and S. Wang has been used to obtain results of their approach. Figure 3(b) shows the tamper data and locations, and this tamper data alter 4211 pixels with (where is the ratio between the number of tampered blocks and the total number of blocks ).
Comparison of proposed SS and ZW methods
PSNR SS method
PSNR ZW method
Time SS method
Time ZW method
Figure 3(a) is watermarked using the SS approach and then tampered according to the data in Figure 3(b). PSNR of the SS watermarked image is 38.30 dB. The difference between this tampered image and the original is shown in Figure 3(c). Similarly, ZW approach is used and its corresponding PSNR is 37.97 and the difference image is shown in Figure 3(d). The close PSNR values in Table 1 (columns 2 and 3) show that the watermark embedded by the SS and ZW approaches affect the quality of the images the same way, however, the other parameters such as the computational time, detection rate, false-positive, and false-negative show that the SS approach performs better than ZW approach. Also the high PSNR values and the Figures 3(c) and 3(d) show that the proposed watermarks do not degrade the image properties in homogeneous regions compared to ZW approach.
In Figures 3(e) and 3(f), the watermarks extracted using the AgTDM and ZW approach are presented, respectively. It can be seen from the patterns that the watermark extracted using AgTDM is much closer to the actual watermark (see Figure 3(b)). Findings are as follows: AgTDM detects 4420 pixels as tampered pixels where 3997 are certainly tampered pixels and 423 (which include 206 tampered pixels and 217 not-tampered pixels) are high likely tampered pixels. That is, tampered pixels have been detected with 217 false-positive pixels and 8 false-negative pixels. In other words, AgTDM is capable of detecting 99.8% of tampered pixels with 0.35% false-positive detection and 0.19% false-negative detection. ZW approach detects 2912 tampered pixels with 1299 false-negative and 1341 false-positive pixels. The simulation also indicates that the proposed extraction takes about 12.86 seconds cputime (Matlab function) whereas ZW approach takes 154.78 seconds. The corresponding images of the "UNCG" image are displayed in Figures 4(b)–4(f). They demonstrate the similar results. The collated results, using several images, in Table 1 follow the same arguments and they support the same conclusions.
A fragile image watermarking scheme is proposed in this study. The proposed scheme is a 5MSB:3LSB technique and capable of detecting pixel-level tampering present in the 5 MSBs. This scheme has also introduced nonaggressive and aggressive tamper detection methods. The novelty of the aggressiveness is that it artificially increases the false-positive tamper detection to increase the accuracy of the actual tampered pixel detection. Using these tamper detection, superior pixel-level tamper detection can be achieved with negligible false-negative and false-positive tamper detection responses.
Algorithm 1: Pixel-Level Tamper Detection Rule.
I nput: Watermarked Image
O utput: Tampered and Not-Tampered Pixels
If a pixel is detected as tampered by NgTDM then the pixel is certainly
a tampered pixel;
If a pixel is detected by both NgTDM and AgTDM as not tampered then
the pixel is considered a not-tampered pixel;
If a pixel is detected by NgTDM as not tampered and detected by
AgTDM as tampered then
If this pixel belongs to a block ( pixels) that consists of all
pixels that are detected by NgTDM as not tampered then the pixel
is considered not tampered;
Else if the pixel has middle gray value using the 5-MSB bits (i.e.,
between 112 and 136 inclusive) then the pixel is high likely
tampered otherwise the pixel is not tampered.
The author of this paper wishes to thank X. Zhang and S. Wang for providing Matlab program of their approach in . The author also thanks anonymous referees for their valuable comments and recommendations to enhance this paper.
- Walton S: Image authentication for a slippery new age. Dr. Dobb's Journal 1995, 20(4):18-26.MathSciNetGoogle Scholar
- Fridrich J: Security of fragile authentication watermarks with localization. Security and Watermarking of Multimedia Contents IV, January 2002, Proceedings of SPIE 4675: 691-700.View ArticleGoogle Scholar
- Li Y, Guo H, Jajodia S: Tamper detection and localization for categorical data using fragile watermarks. Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM '04), October 2004 73-82.View ArticleGoogle Scholar
- Lu H, Shen R, Chung F-L: Fragile watermarking scheme for image authentication. Electronics Letters 2003, 39(12):898-900. 10.1049/el:20030589View ArticleGoogle Scholar
- Suthaharan S: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 2004, 25(16):1893-1903. 10.1016/j.patrec.2004.08.017View ArticleGoogle Scholar
- Zhang X, Wang S: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Processing Letters 2007, 14(10):727-730. 10.1109/LSP.2007.896436View ArticleGoogle Scholar
- Zhang X, Wang S: Fragile watermarking scheme using a hierarchical mechanism. Signal Processing 2009, 89(4):675-679. 10.1016/j.sigpro.2008.10.001View ArticleMATHGoogle Scholar
- Liu S-H, Yao H-X, Gao W, Liu Y-L: An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Applied Mathematics and Computation 2007, 185(2):869-882. 10.1016/j.amc.2006.07.036View ArticleMATHGoogle Scholar
- Liu P-P, Zhu Z-L, Wang H-X, Yan T-Y: A novel image fragile watermarking algorithm based on chaotic map. Proceedings of the 1st International Congress on Image and Signal Processing (CISP '08), May 2008 5: 631-634.View ArticleGoogle Scholar
- Che S, Ma B, Che Z: An adaptive and fragile image watermarking algorithm based on composite chaotic iterative dynamic system. In Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08), 2008. IEEE Computer Society; 159-162.Google Scholar
- Tsonis AA: Chaos: From Theory to Applications.chapter 6 Plenum Press, New York, NY, USA; 1992.View ArticleGoogle Scholar
- Suthaharan S: Chaos-based image encryption scheme using Galois field for fast and secure transmission. Real-Time Image Processing 2008, 2008, Proceedings of SPIE6811: 1-9. 681105Google Scholar
- Suthaharan S: A perceptual quality metric for digital video coding. Electronics Letters 2003, 39(5):431-432. 10.1049/el:20030308View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.