This is a preview and has not been published. View submission

Image Watermarking for Tamper Correction Based on Hamming Error Correcting Code

Authors

  • Pinapati Lakshmana Rao Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522302, Andhra Pradesh, India
  • Reshma Sonar Department of Computer Engineering and Technology, Dr. Vishwanath Karad MIT World Peace University, Pune, India
  • Nanditha Boddu Vidya Jyothi Institute of Technology, Aziz Nagar Gate, C.B. Post, Hyderabad 500075, Telangana, India
  • Anita Pradhan Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522302, Andhra Pradesh, India
  • Ranjan K. Senapati Department of ECE, VNR Vignana Jyothi Institute of Engineering & Technology, Bachupally, Nizampet (S.O), Hyderabad 500090, Telangana, India
  • Gandharba Swain Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522302, Andhra Pradesh, India
Volume: 15 | Issue: 4 | Pages: 25213-25220 | August 2025 | https://doi.org/10.48084/etasr.11632

Abstract

Watermarking techniques are designed to embed a watermark in a manner that enables precise detection of tampering at the receiver side. This article presents an image watermarking and tamper detection technique based on a modified Hamming code. The watermarking process is applied to each individual pixel of the gray image, with each pixel is represented using 8 bits. The 4 higher plane bits of a pixel are designated as data bits, and based on these, 3 redundant bits are computed. These 3 redundant bits are then modified using a Logistic Map (LM). Furthermore, based on the 4 data bits and 3 modified redundant bits, a parity bit is computed. The 3 modified redundant bits along with the parity bit form the Watermark Bits (WBs), which are embedded into the Least Significant Bit (LSB) positions of the pixel. This process results in a watermarked pixel. In the event that a single bit is tampered with, it can be easily identified and corrected at the receiver according to the detection and correction logic. The Hiding Capacity (HC) is 4 bits per pixel, and the distortion measure is 31 dB. Although the similarity index is reduced the accuracy of tamper detection is significantly improved.

Keywords:

tamper correction, image integrity check, watermarking, modified Hamming code, logistic map

Downloads

Download data is not yet available.

References

N. B. A. Warif et al., "Copy-move forgery detection: Survey, challenges and future directions," Journal of Network and Computer Applications, vol. 75, pp. 259–278, Nov. 2016.

A. R. Gottimukkala, N. Kumar, J. K. Dash, and G. Swain, "Image watermarking based on remainder value differencing and extended Hamming code," Journal of Electronic Imaging, vol. 33, no. 1, Nov. 2023, Art. no. 011003.

D. Singh and S. K. Singh, "Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability," Journal of Visual Communication and Image Representation, vol. 38, pp. 775–789, Jul. 2016.

F. Cao, B. An, J. Wang, D. Ye, and H. Wang, "Hierarchical recovery for tampered images based on watermark self-embedding," Displays, vol. 46, pp. 52–60, Jan. 2017.

S. Gull, N. A. Loan, S. A. Parah, J. A. Sheikh, and G. M. Bhat, "An efficient watermarking technique for tamper detection and localization of medical images," Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 5, pp. 1799–1808, May 2020.

S. Bhalerao, I. A. Ansari, and A. Kumar, "A secure image watermarking for tamper detection and localization," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 1057–1068, Jan. 2021.

E. Gul and S. Ozturk, "A novel triple recovery information embedding approach for self-embedded digital image watermarking," Multimedia Tools and Applications, vol. 79, no. 41, pp. 31239–31264, Nov. 2020.

C. Qin, P. Ji, X. Zhang, J. Dong, and J. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280–293, Sep. 2017.

S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840–847, Oct. 2011.

M. Botta, D. Cavagnino, and V. Pomponiu, "A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 69, no. 1, pp. 242–245, Jan. 2015.

S. Prasad and A. K. Pal, "A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images," Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 44, no. 2, pp. 703–727, Jun. 2020.

A. K. Sahu, "A logistic map based blind and fragile watermarking for tamper detection and localization in images," Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 8, pp. 3869–3881, Aug. 2022.

M. Nazari, A. Sharif, and M. Mollaeefar, "An improved method for digital image fragile watermarking based on chaotic maps," Multimedia Tools and Applications, vol. 76, no. 15, pp. 16107–16123, Aug. 2017.

K. Sreenivas and V. Kamakshiprasad, "Improved image tamper localisation using chaotic maps and self-recovery," Journal of Visual Communication and Image Representation, vol. 49, pp. 164–176, Nov. 2017.

R. W. Hamming, "Error detecting and error correcting codes," The Bell System Technical Journal, vol. 29, no. 2, pp. 147–160, Apr. 1950.

C.-C. Chang, K.-N. Chen, C.-F. Lee, and L.-J. Liu, "A secure fragile watermarking scheme based on chaos-and-hamming code," Journal of Systems and Software, vol. 84, no. 9, pp. 1462–1470, Sep. 2011.

S. Trivedy and A. K. Pal, "A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection," Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 41, no. 2, pp. 103–113, Jun. 2017.

S. Prasad and A. K. Pal, "A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy," Multimedia Tools and Applications, vol. 79, no. 3, pp. 1673–1705, Jan. 2020.

S. Prasad and A. K. Pal, "Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking," Multimedia Tools and Applications, vol. 79, no. 29, pp. 20897–20928, Aug. 2020.

S. N. V. J. Devi Kosuru, G. Swain, N. Kumar, and A. Pradhan, "Image tamper detection and correction using Merkle tree and remainder value differencing," Optik, vol. 261, Jul. 2022, Art. no. 169212.

A. R. Gottimukkala, A. Pradhan, P. Patro, J. Hemalata, R. K. Senapati, and G. Swain, "Image Tamper Detection and Correction Using Modified Hamming Code with Eight Data Bits and Four Redundant Bits," International Journal of Safety and Security Engineering, vol. 14, no. 6, pp. 1871–1881, Dec. 2024.

A. R. Gottimukkala, A. Pradhan, N. Kumar, A. K. Pradhan, R. K. Senapati, and G. Swain, "Digital Image Watermarking for Image Integrity Verification and Tamper Correction," Contemporary Mathematics, vol. 6, no. 2, pp. 1853–1873, Mar. 2025.

D. B. Khadse and G. Swain, "Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree," Arabian Journal for Science and Engineering, vol. 48, no. 2, pp. 1793–1805, Feb. 2023.

S. N. V. J. D. Kosuru, A. Pradhan, K. A. Basith, R. Sonar, and G. Swain, "Digital Image Steganography With Error Correction on Extracted Data," IEEE Access, vol. 11, pp. 80945–80957, 2023.

A. Singh and M. K. Dutta, "A robust zero-watermarking scheme for tele-ophthalmological applications," Journal of King Saud University - Computer and Information Sciences, vol. 32, no. 8, pp. 895–908, Oct. 2020.

S. Gull, R. F. Mansour, N. O. Aljehane, and S. A. Parah, "A self-embedding technique for tamper detection and localization of medical images for smart-health," Multimedia Tools and Applications, vol. 80, no. 19, pp. 29939–29964, Aug. 2021.

P. Singh, K. J. Devi, H. K. Thakkar, M. Bilal, A. Nayyar, and D. Kwak, "Robust and Secure Medical Image Watermarking for Edge-Enabled e-Healthcare," IEEE Access, vol. 11, pp. 135831–135845, 2023.

S. Bhalerao, I. A. Ansari, and A. Kumar, "A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery," Circuits, Systems, and Signal Processing, vol. 42, no. 11, pp. 6701–6725, Nov. 2023.

A. Tareef, K. Al-Tarawneh, and A. Sleit, "Block-based Watermarking for Robust Authentication and Integration of GIS Data," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16340–16345, Oct. 2024.

"SIPI Image Database." Signal and Image Processing Institute, University of Southern California (USC). [Online]. Available: https://sipi.usc.edu/database/database.php?volume=misc.

Downloads

How to Cite

[1]
Rao, P.L., Sonar, R., Boddu, N., Pradhan, A., Senapati, R.K. and Swain, G. 2025. Image Watermarking for Tamper Correction Based on Hamming Error Correcting Code. Engineering, Technology & Applied Science Research. 15, 4 (Aug. 2025), 25213–25220. DOI:https://doi.org/10.48084/etasr.11632.

Metrics

Abstract Views: 22
PDF Downloads: 18

Metrics Information