Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250900081-8.doi: 10.11896/jsjkx.250900081

• Information Security • Previous Articles    

Image Tampering Detection and Self-recovery Algorithm Based on Quantum-secure and FragileWatermarking

CHEN Hongxiang1, CHEN Guo1, ZHANG Hui1, WU Meiqi1, DING Qiqi1, LUO He1, WANG Hao1, GU Linming1, LUO Huiheng2, WANG Jinghan2   

  1. 1 China Yangtze Power Co.,Ltd.,Wuhan 430014,China
    2 China Three Gorges Wuhan Science and Technology Innovation Park,Wuhan 430000,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Scientific Research Project of China Yangtze Power Co.,Ltd.(1623020020).

Abstract: In the context of remote monitoring and unattended inspection in power systems,images have become a crucial medium for recording and transmitting defect information.However,when transmitted over public channels,these images are highly susceptible to malicious tampering and forgery,posing serious threats to system security and fault response efficiency.To address this issue,this paper proposes an image tamper detection and self-recovery method tailored for power communication scenarios.The proposed approach constructs a perfect hashing-based authentication model using a quantum random number generator,ensuring high randomness and unpredictability to enhance resistance against tampering.It further integrates a block-level image matching strategy and a SPIHT encoding algorithm to generate both authentication and recovery data.These data are embedded into the original communication image as fragile watermarks,enabling precise localization and recovery of tampered regions.The embedding key is securely shared via a quantum key distribution protocol,effectively preventing key leakage or manipulation during transmission.Experimental results on standard image datasets demonstrate that the proposed method outperforms existing schemes in terms of tamper detection accuracy,recovery performance,security,embedding capacity,and visual quality,making it well-suited for integrity protection and trusted authentication of power image transmission.

Key words: Tamper detection, Image recovery, Fragile watermarking, Quantum security, Perfect hash

CLC Number: 

  • TP391
[1]MADHUSHREE B,BASANTH K H B,CHENNAMMA H R.An exhaustive review of authentication,tamper detection with localization and recovery techniques for medical images[J].Multimedia Tools and Applications,2024,83(13):39779-39821.
[2]ALORAINI M,SHARIFZADEH M,SCHONFELD D.Sequential and patch analyses for object removal video forgery detection and localization[J].IEEE Transactions on Circuits and Systems for Video Technology,2021,31(3):917-930.
[3]SHAIK A S,KARSH R K,ISLAM M,et al.A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication[J].Wireless Communications and Mobile Computing,2022,16(4):56-58.
[4]BAPPY J H,SIMONS C,NATARAJ L,et al.Hybrid LSTM and encoder-decoder architecture for detection of image forgeries[J].IEEE Transactions on Image Processing,2019,28(7):3286-3300.
[5]BHALERAO S,ANSARI I A,KUMAR A.A secure image watermarking for tamper detection and localization[J].Journal of Ambient Intelligence and Humanized Computing,2021,12(1):1057-1068.
[6]SINHAL R,ANSARI I A.Multipurpose image watermarking:ownership check,tamper detection and self-recovery[J].Circuits,Systems,and Signal Processing,2022,41(6):3199-3221.
[7]VAIDYA S P,KANDALA R N,CHANDRA M P,et al.A robust fragile watermarking approach for image tampering detection and restoration utilizing hybrid transforms[J].Scientific Reports,2025,15(1):1-24.
[8]AHMADI S B B,ZHANG G,RABBANI M,et al.An intelligent and blind dual color image watermarking for authentication and copyright protection[J].Applied Intelligence,2021,51(3):1701-1732.
[9]VAN S R G,TIRKEL A Z,OSBORNE C F.A digital water-mark[C]//Proceedings of 1st International Conference on Image Processing.1994:86-90.
[10]LIN P L,HSIEH C K,HUANG P W.A hierarchical digital watermarking method for image tamper detection and recovery[J].Pattern Recognition,2005,38(12):2519-2529.
[11]LEE T Y,LIN S D.Dual watermark for image tamper detection and recovery[J].Pattern Recognition,2008,41(11):3497-3506.
[12]QIN C,JI P,ZHANG X,et al.Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy[J].Signal Processing,2017,138:280-293.
[13]SARRESHTEDARI S,AKHAEE M A.A source-channel cod-ing approach to digital image protection and self-recovery[J].IEEE Transactions on Image Processing,2015,24(7):2266-2277.
[14]BOLOURIAN H B,TAHERINIA A H,MOHAJERZADEH A H.TRLG:Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA[J].Information Sciences,2019,486:204-230.
[15]SREENIVAS K,KAMAKSHIPRASAD V.Improved imagetamper localisation using chaotic maps and self-recovery[J].Journal of Visual Communication and Image Representation,2017,49:164-176.
[16]PRASAD S,PAL A K.A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy[J].Multimedia Tools and Applications,2020,79(3):1673-1705.
[17]LIU T,YUAN X.Adaptive feature calculation and diagonalmapping for successive recovery of tampered regions[J].IEEE Transactions on Circuits and Systems for Video Technology,2021,31(7):2617-2630.
[18]CAO Y,ZHAO Y,WANG Q,et al.The evolution of quantum key distribution networks:On the road to the qinternet[J].IEEE Communications Surveys & Tutorials,2022,24(2):839-894.
[19]MANNALATHA V,MISHRA S,PATHAK A.A comprehensive review of quantum random number generators:Concepts,classification and the origin of randomness[J].Quantum Information Processing,2023,22(12):439-445.
[20]SPRUGNOLI R.Perfect hashing functions:a single probe retrie-ving method for static sets[J].Communications of the ACM,1977,20(11):841-850.
[21]DU M W,HSIEH T M,JEA K F,et al.The study of a new perfect hash scheme[J].IEEE Transactions on Software Engineering,1983,9(3):305-313.
[22]SHAPIRO J.Embedded image coding using zerotrees of wavelet coefficients[J].IEEE Transactions on Signal Processing,1993,41(12):3445-3462.
[23]SAID A,PEARLMAN W A.A new,fast,and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Transactions on Circuits and Systems for Video Technology,1996,6(3):243-250.
[24]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(34):313-336.
[25]LIU Y X,YANG C N,SUN Q D,et al.Enhanced embedding capacity for the SMSD-based data-hiding method[J].Signal Processing:Image Communication,2019,78:216-222.
[26]HE W,CAI Z.Reversible data hiding based on dual pairwise prediction-error expansion[J].IEEE Transactions on Image Processing,2021,30:5045-5055.
[27]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141.
[28]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modification-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155.
[29]HAOUZIA A,NOUMEIR R.Methods for image authentica-tion:a survey[J].Multimedia Tools and Applications,2008,39(1):1-46.
[30]PENG Y,NIU X,FU L,et al.Image authentication scheme based on reversible fragile watermarking with two images[J].Journal of Information Security and Applications,2018,40:236-246.
[31]YIN Z,NIU X,ZHOU Z,et al.Improved reversible image authentication scheme[J].Cognitive Computation,2016,8(5):890-899.
[1] CHENG Andong, XIE Sijiang, LIU Ang, FENG Yimeng. Efficient Quantum-secure Byzantine Fault Tolerance Consensus Mechanism Based on HotStuff [J]. Computer Science, 2024, 51(8): 429-439.
[2] TIAN Yang, BI Xiu-li, XIAO Bin, LI Wei-sheng, MA Jian-feng. Image Seam Carving Tampering Detection by Discrete Tchebichef Transform [J]. Computer Science, 2021, 48(6A): 43-50.
[3] ZHENG Qiu-mei, LIU Nan, WANG Feng-hua. Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm [J]. Computer Science, 2020, 47(10): 332-338.
[4] ZHAO Yang, WANG Wei, DONG Rong, WANG Jing-shi and TANG Min. Compressed Sensing Recovery Algorithm for Region of Interests of MRI/MRA Images Based on NLTV and NESTA [J]. Computer Science, 2017, 44(9): 308-314.
[5] SUI Li-li and WANG Chuan-jian. Checking Topological Integrity of Geographic Data Based on Fragile Watermarking [J]. Computer Science, 2016, 43(2): 183-187.
[6] CUI Wen-cheng, LIANG Shuang-shuang, SHAO Hong and WANG Hai-yu. Research on Detection of Image Region-duplication Forgery Affected by Intrinsically Identical Objects [J]. Computer Science, 2015, 42(Z6): 226-230.
[7] CUI Zhuang,LV Jun-bai and FENG Tao. Self-embedding Fragile Watermarking Based on DDWT Coding [J]. Computer Science, 2013, 40(8): 282-284.
[8] . Research and Design of Multimedia Digital Products Copyright Protection Model [J]. Computer Science, 2013, 40(1): 98-102.
[9] XIAO Lei. Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types [J]. Computer Science, 2010, 37(2): 286-289.
[10] . [J]. Computer Science, 2008, 35(3): 13-17.
[11] . [J]. Computer Science, 2008, 35(1): 258-260.
[12] . [J]. Computer Science, 2007, 34(12): 252-256.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!