Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

This code provides a solution for digital image authentication and tamper localization using reversible fragile watermarking.

License

Notifications You must be signed in to change notification settings

Riadh-Bouarroudj/Reversible-fragile-watermarking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Reversible-fragile-watermarking

Description and explanation

With the widespread availability of powerful image manipulation software, achieving authentication and anti-counterfeiting for digital images is increasingly important. This code provides a solution for digital image authentication and tamper localization using reversible fragile watermarking.

Fragile watermarking is a data-hiding technique that conceals information, known as the watermark within an image (referred to as the host or cover image) without causing significant distortion to the original image. The resulting image, termed the watermarked image, is then transmitted to the receiver, who can extract the watermark to determine whether the image has undergone any alteration. If the watermarked image is found to be altered, the tampered areas will be accurately highlighted, and the recovery process will take place to restore the altered regions. Otherwise, if the watermarked image is unaltered, the original image can be restored due to the model’s reversibility, which is useful in sensitive domains such as the medical sector where any alteration is deemed unacceptable.

Untitled Diagram (13)

In the proposed solution, an authentication watermark is embedded within the cover image using a reversible embedding technique based on the maximum coefficient values. To enhance the model’s security, the authentication watermark is encrypted using the Henon map, allowing accurate tamper localization. This method is considered semi-blind, as it requires a list called "Max_frequencies" to be transmitted along with the watermarked image for the watermark extraction process.

To assess the quality of the watermarked and restored images produced by the model, three image quality metrics are employed: Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index Measure (SSIM). Additionally, the Bit Error Rate (BER) metric is used to evaluate the accuracy of the watermark extraction procedure.

Structure and important details

  • This code works with both color and grayscale images with a bit depth of 8 bits (pixel values ranging between 0 and 255). If you want to work with images with a bit depth greater than 8 or containing negative values, the code will need some adjustments.
  • The original image is normalized to the range of [1, 254] to avoid overflow and underflow problems (pixel values out of the range [0, 255]). Even if such issues occur, the authentication and tamper localization processes will still work accurately. However, the original image will not be perfectly restored, resulting in a PSNR lower than infinite
  • The "Max_frequencies" list is saved in the "Image" folder as "Max_frequencies.pkl". This file is necessary for the extraction process, as the proposed model adopts a semi-blind approach.
  • The file "Attacks.py" contains the attacks used to evaluate the proposed method robustness, and two functions ("TIFF_save" and "PNG_save") for saving the watermarked image. It is worth noting that using "JPEG_save" is considered an attack since the watermarked image will undergo compression, which is not possible when using Fragile watermarking models.
  • The file "config_variables.py" contains all the inputs that can be changed, such as the cover image path, the image size, the block size, etc. I recommend using a block size of 3 for more accurate tamper localization, or a block size of 6 for higher watermarked image quality.
  • "Functions.py" contains all the essential functions used in this method, including, watermark generation, embedding, extraction, etc.
  • The method can be launched from "Main.py", which contains an example of the embedding and extraction procedures, as well as the attacks performed to evaluate the model’s robustness.

Data citation

If you find this code to be useful for your scientific research, please cite some of the following papers associated with this code:

  • Riadh Bouarroudj, Feryel Souami, Fatma Zohra Bellala, Nabil Zerrouki, A reversible fragile watermarking technique using fourier transform and Fibonacci Q-matrix for medical image authentication, Biomedical Signal Processing and Control, Volume 92, 2024, 105967. https://doi.org/10.1016/j.bspc.2024.105967
  • R. Bouarroudj, F. Souami and F. Z. Belalla, "Reversible Fragile Watermarking for Medical Image Authentication in the Frequency Domain," 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), Medea, Algeria, 2023, pp. 1-6. https://doi.org/10.1109/IC2EM59347.2023.10419699
  • R. Bouarroudj, F. Souami and F. Z. Bellala, "Fragile watermarking for medical image authentication based on DCT technique," 2023 5th International Conference on Pattern Analysis and Intelligent Systems (PAIS), Sétif, Algeria, 2023, pp. 1-6. https://doi.org/10.1109/PAIS60821.2023.10322029

Image sources

The Datasets used to evaluate the proposed method’s performance can be accessed via the following links:

About

This code provides a solution for digital image authentication and tamper localization using reversible fragile watermarking.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages