Image Tamper Detection and Recovery by Intersecting Signatures

Chun-Hung Chen, Yuan-Liang Tang, Wen-Shyong Hsieh, Min-Shiang Hwang


In this paper, we propose an exact image authentication scheme that can, in the best case, detect image tampering with the accuracy of one pixel. This method is based on constructing blocks in the image in such a manner that they intersect with one another in different directions. Such a technique is very useful to identify whether an individual image pixel has been tampered with. Moreover, the tampered region can be well recovered with the embedded recover data.

Full Text:



Liu H, Lin J, Huang J. Image authentication using content based watermark. Proc. IEEE Int. Sym. Circuits and Systems. 2005; 4: 4014-4017.

Rawat S, Raman B. A chaotic system based fragile watermarking scheme for image tamper detection. Int. J. Electron. Commun. 2011; 65: 840-847.

Xi'an Z. A semi-fragile digital watermarking algorithm in wavelet transform domain based on Arnold transform. Proc. IEEE Int. Conf. Signal Process. 2008: 2217-2220.

Patra JC, Phua JE, Rajan D. DCT domain watermarking scheme using Chinese Remainder Theorem for image authentication. Proc. IEEE Int. Conf. Multimedia and Expo. 2010: 111-116.

Qi X, Xin X, Chang R. Image authentication and tamper detection using two complementary watermarks. Proc. IEEE Int. Conf. Image Process. 2009: 4257-4260.

Wu Y. Tamper-Localization Watermarking with Systematic Error Correcting Code. Proc. IEEE Int. Conf. Image Process. 2006: 1965-1968.

Chen CH, Tang YL, Hsieh WS, Hwang MS. Image Protection by Intersecting Signatures. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2014; 12: 6386-6392.

Wallace GK. The JPEG Still Picture Compression Standard. IEEE Trans. Consumer Electronics. 1992; 38: xviii-xxxiv.

Holliman M, Memon N. Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Process. 2000; 9: 432-441.

Barreto PSLM, Kim HY, Rijmen V. Toward secure public-key blockwise fragile authentication watermarking. IEE Proc. Vision, Image and Signal Processing. 2002; 149: 57-62.

Liu Q. An Adaptive Blind Watermarking Algorithm for Color Image. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2013; 11: 302-309.

Tan X, Hu D. A Watermarking Method Based on Optimization Statistics. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2013; 11: 4794-4802.

Neyman SN, Pradnyana INP, Sitohang B. A New Copyright Protection for Vector Map using FFT-based Watermarking. TELKOMNIKA Telecommunication, Computing, Electronics and Control. 2014; 12: 367-378.

MT Suryadi, Nurpeti E. Performance of Chaos-Based Encryption Algorithm for Digital Image. TELKOMNIKA Telecommunication, Computing, Electronics and Control. 2014; 12: 675-682.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

TELKOMNIKA Telecommunication, Computing, Electronics and Control
ISSN: 1693-6930, e-ISSN: 2302-9293
Universitas Ahmad Dahlan, 4th Campus
Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191
Phone: +62 (274) 563515, 511830, 379418, 371120
Fax: +62 274 564604