Image Watermarking for Tamper Correction Based on Hamming Error Correcting Code
Received: 21 April 2025 | Revised: 16 May 2025 | Accepted: 1 June 2025 | Online: 28 June 2025
Corresponding author: Gandharba Swain
Abstract
Watermarking techniques are designed to embed a watermark in a manner that enables precise detection of tampering at the receiver side. This article presents an image watermarking and tamper detection technique based on a modified Hamming code. The watermarking process is applied to each individual pixel of the gray image, with each pixel is represented using 8 bits. The 4 higher plane bits of a pixel are designated as data bits, and based on these, 3 redundant bits are computed. These 3 redundant bits are then modified using a Logistic Map (LM). Furthermore, based on the 4 data bits and 3 modified redundant bits, a parity bit is computed. The 3 modified redundant bits along with the parity bit form the Watermark Bits (WBs), which are embedded into the Least Significant Bit (LSB) positions of the pixel. This process results in a watermarked pixel. In the event that a single bit is tampered with, it can be easily identified and corrected at the receiver according to the detection and correction logic. The Hiding Capacity (HC) is 4 bits per pixel, and the distortion measure is 31 dB. Although the similarity index is reduced the accuracy of tamper detection is significantly improved.
Keywords:
tamper correction, image integrity check, watermarking, modified Hamming code, logistic mapDownloads
References
N. B. A. Warif et al., "Copy-move forgery detection: Survey, challenges and future directions," Journal of Network and Computer Applications, vol. 75, pp. 259–278, Nov. 2016.
A. R. Gottimukkala, N. Kumar, J. K. Dash, and G. Swain, "Image watermarking based on remainder value differencing and extended Hamming code," Journal of Electronic Imaging, vol. 33, no. 1, Nov. 2023, Art. no. 011003.
D. Singh and S. K. Singh, "Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability," Journal of Visual Communication and Image Representation, vol. 38, pp. 775–789, Jul. 2016.
F. Cao, B. An, J. Wang, D. Ye, and H. Wang, "Hierarchical recovery for tampered images based on watermark self-embedding," Displays, vol. 46, pp. 52–60, Jan. 2017.
S. Gull, N. A. Loan, S. A. Parah, J. A. Sheikh, and G. M. Bhat, "An efficient watermarking technique for tamper detection and localization of medical images," Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 5, pp. 1799–1808, May 2020.
S. Bhalerao, I. A. Ansari, and A. Kumar, "A secure image watermarking for tamper detection and localization," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 1057–1068, Jan. 2021.
E. Gul and S. Ozturk, "A novel triple recovery information embedding approach for self-embedded digital image watermarking," Multimedia Tools and Applications, vol. 79, no. 41, pp. 31239–31264, Nov. 2020.
C. Qin, P. Ji, X. Zhang, J. Dong, and J. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280–293, Sep. 2017.
S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840–847, Oct. 2011.
M. Botta, D. Cavagnino, and V. Pomponiu, "A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 69, no. 1, pp. 242–245, Jan. 2015.
S. Prasad and A. K. Pal, "A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images," Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 44, no. 2, pp. 703–727, Jun. 2020.
A. K. Sahu, "A logistic map based blind and fragile watermarking for tamper detection and localization in images," Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 8, pp. 3869–3881, Aug. 2022.
M. Nazari, A. Sharif, and M. Mollaeefar, "An improved method for digital image fragile watermarking based on chaotic maps," Multimedia Tools and Applications, vol. 76, no. 15, pp. 16107–16123, Aug. 2017.
K. Sreenivas and V. Kamakshiprasad, "Improved image tamper localisation using chaotic maps and self-recovery," Journal of Visual Communication and Image Representation, vol. 49, pp. 164–176, Nov. 2017.
R. W. Hamming, "Error detecting and error correcting codes," The Bell System Technical Journal, vol. 29, no. 2, pp. 147–160, Apr. 1950.
C.-C. Chang, K.-N. Chen, C.-F. Lee, and L.-J. Liu, "A secure fragile watermarking scheme based on chaos-and-hamming code," Journal of Systems and Software, vol. 84, no. 9, pp. 1462–1470, Sep. 2011.
S. Trivedy and A. K. Pal, "A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection," Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 41, no. 2, pp. 103–113, Jun. 2017.
S. Prasad and A. K. Pal, "A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy," Multimedia Tools and Applications, vol. 79, no. 3, pp. 1673–1705, Jan. 2020.
S. Prasad and A. K. Pal, "Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking," Multimedia Tools and Applications, vol. 79, no. 29, pp. 20897–20928, Aug. 2020.
S. N. V. J. Devi Kosuru, G. Swain, N. Kumar, and A. Pradhan, "Image tamper detection and correction using Merkle tree and remainder value differencing," Optik, vol. 261, Jul. 2022, Art. no. 169212.
A. R. Gottimukkala, A. Pradhan, P. Patro, J. Hemalata, R. K. Senapati, and G. Swain, "Image Tamper Detection and Correction Using Modified Hamming Code with Eight Data Bits and Four Redundant Bits," International Journal of Safety and Security Engineering, vol. 14, no. 6, pp. 1871–1881, Dec. 2024.
A. R. Gottimukkala, A. Pradhan, N. Kumar, A. K. Pradhan, R. K. Senapati, and G. Swain, "Digital Image Watermarking for Image Integrity Verification and Tamper Correction," Contemporary Mathematics, vol. 6, no. 2, pp. 1853–1873, Mar. 2025.
D. B. Khadse and G. Swain, "Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree," Arabian Journal for Science and Engineering, vol. 48, no. 2, pp. 1793–1805, Feb. 2023.
S. N. V. J. D. Kosuru, A. Pradhan, K. A. Basith, R. Sonar, and G. Swain, "Digital Image Steganography With Error Correction on Extracted Data," IEEE Access, vol. 11, pp. 80945–80957, 2023.
A. Singh and M. K. Dutta, "A robust zero-watermarking scheme for tele-ophthalmological applications," Journal of King Saud University - Computer and Information Sciences, vol. 32, no. 8, pp. 895–908, Oct. 2020.
S. Gull, R. F. Mansour, N. O. Aljehane, and S. A. Parah, "A self-embedding technique for tamper detection and localization of medical images for smart-health," Multimedia Tools and Applications, vol. 80, no. 19, pp. 29939–29964, Aug. 2021.
P. Singh, K. J. Devi, H. K. Thakkar, M. Bilal, A. Nayyar, and D. Kwak, "Robust and Secure Medical Image Watermarking for Edge-Enabled e-Healthcare," IEEE Access, vol. 11, pp. 135831–135845, 2023.
S. Bhalerao, I. A. Ansari, and A. Kumar, "A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery," Circuits, Systems, and Signal Processing, vol. 42, no. 11, pp. 6701–6725, Nov. 2023.
A. Tareef, K. Al-Tarawneh, and A. Sleit, "Block-based Watermarking for Robust Authentication and Integration of GIS Data," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16340–16345, Oct. 2024.
"SIPI Image Database." Signal and Image Processing Institute, University of Southern California (USC). [Online]. Available: https://sipi.usc.edu/database/database.php?volume=misc.
Downloads
How to Cite
License
Copyright (c) 2025 Pinapati Lakshmana Rao, Reshma Sonar, Nanditha Boddu, Anita Pradhan, Ranjan K. Senapati, Gandharba Swain

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.