180 International Journal for Modern Trends in Science and Technology Tamper Detection using Watermarking Scheme and K-Mean Clustering for Bio Medical Images R. Suganya 1 | Dr. R Kanagavalli 2 1,2 ISE, The Oxford College of Engineering, Bangalore, Karnataka, India. To Cite this Article R. Suganya, Dr.R Kanagavalli, DzTamper Detection using Watermarking Scheme and K-Mean Clustering for Bio Medical Imagesdz, International Journal for Modern Trends in Science and Technology, Vol. 02, Issue 11, 2016, pp. 180-185. In this paper, we focus image authentication and tamper detection using K-mean clustering based on fragile watermarking scheme. The two important aspects of the authentication watermarking scheme are Tamper detection and localization accuracy. In our scheme, clustering values of the watermarked image used as secret key. It can be detect any amendment is made to image and also point out the exact location that have been modified. Significant features of the schemes are reducing the time complexity and improving the PSNR value , with stand attacks. Original image is not required for verification. KEYWORDS: Watermarking, k- means clustering, Tamper detection. Copyright © 2016 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION In digital media, with the fast development of the Internet, digital images are used as evidences in the news and court reports. However, using dominant image processing software tools, digital images can be simply modified without any limit. Normally these customized images can cause financial and public damages to the concerned persons. Hence the development of a reliable digital image authentication scheme is a critical problem [1]. This problem can be solved by various authentication schemes that verify the integrity and authenticity of the image content. The authentication schemes may classify in to two categories: as digital signature based schemes and digital watermark based schemes [2]. A digital signature can be either an encrypted or a signed hash value of image contents and/or image characteristics. The foremost problem of signature based schemes is that they can identify if an image has been modified, but they cannot find the regions where the image has been modified. To solve this problem, many researchers have proposed watermarking based schemes for image authentication. Digital watermarking is a technology for embedding digital data in digital content (audio, images, video…). It has initiated as a tool to enhance the security. Watermarking techniques are classified into Spatial Domain and Frequency Domain. In Spatial Domain the watermarking system directly alters the main data elements (like pixels in an image) to hide the watermark data. In Frequency Domain the watermarking system alters the frequency transforms of data elements to hide the watermark data. The watermarking properties are listed as robustness, data payload, capacity, security, computational cost. Robustness of the watermark refers to its ability to withstand non- maliciousdistortions, Data payload is the encoded message size of a watermarked in an image, Capacity is the amount of watermark information in an image, ABSTRACT International Journal for Modern Trends in Science and Technology Volume: 02, Issue No: 11, November 2016 ISSN: 2455-3778 http://www.ijmtst.com