Skip to main content

Self-embedding and Variable Authentication Approach for Fragile Image Watermarking Using SVD and DCT

  • Conference paper
  • First Online:
Cognition and Recognition (ICCR 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1697))

Included in the following conference series:

  • 326 Accesses

Abstract

In this paper, we propose a self-embedding fragile image watermarking technique based on Singular Value Decomposition (SVD) and Discrete Cosine Transform (DCT). To improve security and robustness a novel block separation technique is presented in which an input image is divided into non-overlapping blocks and subsequently SVD is applied on each block. Entropy value of the resulting vector of singular values is measured. Mean of entropy of all blocks is considered as a threshold for deciding two sets of blocks. For the first set of blocks, Entropy measures of singular value based authentication codes are generated and for second set of blocks, DCT DC value based authentication codes are obtained for embedding information. To enhance visual quality of watermarked and recovery image DCT based watermark embedding technique is proposed. Experiments have been conducted on gray scale images and it is observed that proposed scheme gives peak signal to noise ratio (PSNR) of 58 dB which ensures high performance in terms of imperceptibility. Experimental results showed that 99% of watermarked blocks are correctly detected during recovery phase. The image tampering is precisely identified and tampered images are recovered with very good quality. To the best of our knowledge the presented fragile image watermarking scheme is superior to all existing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Walton, S.: Image authentication for a slippery new age. Dr. Dobb’s J. 20(4), 18–22 (1995)

    Google Scholar 

  2. Liu, S.H., Yao, H.X., Gao, W., Liu, Y.L.: An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl. Math. Comput. 185(2), 869–882 (2007)

    MATH  Google Scholar 

  3. Prasad, S., Pal, A.K.: A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed. Tools Appl. 79(3–4), 1673–1705 (2019). https://doi.org/10.1007/s11042-019-08144-5

    Article  Google Scholar 

  4. Prasad, S., Pal, A.K.: Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed. Tools Appl. 79(29–30), 20897–20928 (2020). https://doi.org/10.1007/s11042-020-08715-x

    Article  Google Scholar 

  5. Prasad, S., Pal, A.K.: A secure fragile watermarking scheme for protecting integrity of digital images. Iran. J. Sci. Technol. Trans. Electr. Eng. 44(2), 703–727 (2019). https://doi.org/10.1007/s40998-019-00275-7

    Article  Google Scholar 

  6. Dua, M., Suthar, A., Garg, A., Garg, V.: An ILM-cosine transform-based improved approach to image encryption. Complex Intell. Syst. 7(1), 327–343 (2020). https://doi.org/10.1007/s40747-020-00201-z

    Article  Google Scholar 

  7. Nancharla, B.K., Dua, M.: An image encryption using intertwining logistic map and enhanced logistic map. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 1309–1314. IEEE (2020)

    Google Scholar 

  8. Dua, M., Wesanekar, A., Gupta, V., Bhola, M., Dua, S.: Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. J. Ambient. Intell. Humaniz. Comput. 11(9), 3771–3786 (2019). https://doi.org/10.1007/s12652-019-01580-z

    Article  Google Scholar 

  9. Gul, E., Ozturk, S.: A novel hash function based fragile watermarking method for image integrity. Multimed. Tools Appl. 78(13), 17701–17718 (2019). https://doi.org/10.1007/s11042-018-7084-0

    Article  Google Scholar 

  10. Abdelhakim, A., Saleh, H.I., Abdelhakim, M.: Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed. Tools Appl. 78(22), 32523–32563 (2019)

    Article  Google Scholar 

  11. Singh, D., Singh, S.K.: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J. Vis. Commun. Image Represent. 38, 775–789 (2016)

    Article  Google Scholar 

  12. Singh, D., Singh, S.K.: DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 76(1), 953–977 (2015). https://doi.org/10.1007/s11042-015-3010-x

    Article  MathSciNet  Google Scholar 

  13. Wang, C., Zhang, H., Zhou, X.: A self-recovery fragile image watermarking with variable watermark capacity. Appl. Sci. 8(4), 548–568 (2018)

    Article  Google Scholar 

  14. Kim, C., Shin, D., Yang, C.-N.: Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquit. Comput. 22(1), 11–22 (2017). https://doi.org/10.1007/s00779-017-1061-x

    Article  Google Scholar 

  15. Chang, C.-C., Lin, C.-C., Su, G.-D.: An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multimed. Tools Appl. 79(33–34), 24795–24824 (2020). https://doi.org/10.1007/s11042-020-09132-w

    Article  Google Scholar 

  16. Molina-Garcia, J., Garcia-Salgado, B.P., Ponomaryov, V., Reyes-Reyes, R., Sadovnychiy, S., Cruz-Ramos, C.: An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process.: Image Commun. 81, 115725 (2020). https://doi.org/10.1016/j.image.2019.115725

    Article  Google Scholar 

  17. Shen, J.-J., Lee, C.-F., Hsu, F.-W., Agrawal, S.: A self-embedding fragile image authentication based on singular value decomposition. Multimed. Tools Appl. 79(35–36), 25969–25988 (2020). https://doi.org/10.1007/s11042-020-09254-1

    Article  Google Scholar 

  18. Ahmadi, S.B.B., Zhang, G., Wei, S.: Robust and hybrid SVD-based image watermarking schemes. Multimed. Tools Appl. 79(1), 1075–1117 (2020)

    Article  Google Scholar 

  19. Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 8881–8900 (2016). https://doi.org/10.1007/s11042-016-3514-z

    Article  Google Scholar 

  20. Zear, A., Singh, A.K., Kumar, P.: A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 77(4), 4863–4882 (2016). https://doi.org/10.1007/s11042-016-3862-8

    Article  Google Scholar 

  21. Qi, X., Xin, X.: A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 30, 312–327 (2015). https://doi.org/10.1016/j.jvcir.2015.05.006

    Article  Google Scholar 

  22. Li, C., Zhang, A., Liu, Z., Liao, L., Huang, D.: Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed. Tools Appl. 74(23), 10581–10604 (2014). https://doi.org/10.1007/s11042-014-2188-7

    Article  Google Scholar 

  23. Klema, V., Laub, A.J.: The singular value decomposition: its computation and some applications. IEEE Trans. Autom. Control 25(2), 164–176 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  24. Botta, M., Cavagnino, D., Pomponiu, V.: Reversible fragile watermarking for multichannel images with high redundancy channels. Multimed. Tools Appl. 79(35–36), 26427–26445 (2020). https://doi.org/10.1007/s11042-020-08986-4

    Article  Google Scholar 

  25. Hemida, O., Huo, Y., He, H., Chen, F.: A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed. Tools Appl. 78(9), 12373–12403 (2018). https://doi.org/10.1007/s11042-018-6664-3

    Article  Google Scholar 

  26. Su, G.D., Chang, C.C., Lin, C.C.: Effective self-recovery and tampering localization fragile watermarking for medical images. IEEE Access 8, 160840–160857 (2020). https://doi.org/10.1109/ACCESS.2020.301983216

    Article  Google Scholar 

  27. AlShehri, L., Hussain, M., Aboalsamh, H., Wadood, A.: Fragile watermarking for image authentication using BRINT and ELM. Multimed. Tools Appl. 79(39–40), 29199–29223 (2020). https://doi.org/10.1007/s11042-020-09441-0

    Article  Google Scholar 

  28. Nejati, F., Sajedi, H., Zohourian, A.: Fragile watermarking based on QR decomposition and Fourier transform. Wirel. Pers. Commun. 122(1), 211–227 (2021). https://doi.org/10.1007/s11277-021-08895-1

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. S. Kapre .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kapre, B.S., Rajurkar, A.M., Guru, D.S. (2022). Self-embedding and Variable Authentication Approach for Fragile Image Watermarking Using SVD and DCT. In: Guru, D.S., Y. H., S.K., K., B., Agrawal, R.K., Ichino, M. (eds) Cognition and Recognition. ICCR 2021. Communications in Computer and Information Science, vol 1697. Springer, Cham. https://doi.org/10.1007/978-3-031-22405-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-22405-8_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-22404-1

  • Online ISBN: 978-3-031-22405-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics