Skip to main content
Log in

A self recoverable dual watermarking scheme for copyright protection and integrity verification

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Dual watermarking implies embedding of robust as well as fragile watermarks into the same cover image. It facilitates integration of copyright protection and integrity verification into the same scheme. However, most of such existing state of art approaches either lacked the feature of tamper detection and original content recovery or provided an approximation using coarser block level approach. The proposed self recoverable dual watermarking scheme integrates all the aforementioned functionalities of copyright protection, tamper detection and recovery into one scheme. The scheme is independent of the order of embedding of robust and fragile watermarks as these are embedded in different regions of the cover image. It performs tamper detection and recovery, both at the pixel level. The scheme obtains recovery information for each 2×2 image block in just eight bits which are further encoded to only four bits via mapping table. This reduction in recovery bits allows efficient embedding of copyright information which is tested against comprehensive set of attacks. The scheme is found to be robust against noises, filtering, histogram equalization, rotation, jpeg compression, motion blur etc. Besides the normalized cross correlation value, the evaluation of the extracted copyright information is also being done using various objective error metrics based on mutual relation between pixels, their values and locations respectively. The imperceptibility and visual quality of the watermarked as well as recovered image is found to be satisfactorily high. Three major categories of images: natural, texture as well as satellite have been tested in the proposed scheme. Even minute alterations can be chalked out as the detection accuracy rate has been enumerated on pixel basis. The scheme can tolerate tampering ratios upto 50 percent though the visual quality of the recovered image deteriorates with increasing tampering ratio. Comparative results based on normalized cross correlation, probability of false acceptance, probability of false rejection and peak signal to noise ratio metrics validate the efficacy of the proposed scheme over other existing state of art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31

Similar content being viewed by others

References

  1. (2013) A blind image copyright protection scheme for e-government. J Visual Communication and Image Representation. 24(7): 1099–1105

  2. (2012) A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst Appl. 39(3): 3185–3196

  3. (2014) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimedia Tools Appl. 72(3): 2469–2495

  4. (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl. 72(3): 3085–3103

  5. (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl. 39(1): 673–689

  6. (2012) Copyright Protection for E-Government Document Images. IEEE MultiMedia. 19(3): 62–73

  7. Agreste S, Andaloro G (2008) A new approach to pre-processing digital image for wavelet-based watermark. J Comput Appl Math 221(2):274–283

    Article  MathSciNet  MATH  Google Scholar 

  8. Chamlawi RA, Khan A (2010) Digital image authentication and recovery: sinteger trans- form based information embedding and extraction. Inf Sci 180:4909–4928

    Article  Google Scholar 

  9. Chemak C, Bouhlel MS, Lapayre JC (2007) A new scheme of robust image watermarking: the double watermarking algorithm. In: Proceedings of the 2007 summer computer simulation conference, pp 1201–1208

  10. Chen B, Coatrieux G., Chen G., Sun X, Coatrieux J, Shu H (2014) Full 4-D quaternion discrete Fourier transform based watermarking for color images. Digital Signal Process 28(1):106–119

    Article  Google Scholar 

  11. Chen F, He H, Tai H, Wang H (2012) Chaos-based self-embedding fragile watermarking with exible watermark payload. Multimedia Tools Appl 72:41–56

    Article  Google Scholar 

  12. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. Elsevier, New York

    Google Scholar 

  13. Cox I, Miller M, Bloom J et al (2001) Digital watermarking. Morgan Kaufmann, Burlington

    Google Scholar 

  14. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coef?cient correlation. Int J Electron Commun 68(3):244– 53

    Article  Google Scholar 

  15. Feng L, Zheng L, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: Proceedings of the IEEE ICCIST, pp 455–458

  16. Gonzalez RC, Woods RE (2001) Digital image processing, 2nd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  17. Guo J, Liu Z, Liu S (2007) Watermarking based on discrete fractional random transform. Opt Commun 272(2):344–348

    Article  MathSciNet  Google Scholar 

  18. Habib M, Sarhan S, Rajab L (2005) A robust-fragile dual watermarking system in the DCT domain. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp 548–553

  19. Haiping Lu (2004) Distance-Reciprocal Distortion Measure for Binary Document Images. IEEE Signal Processing Letters 11(2)

  20. He HJ, Zhang JS, Tai HM (2008) Block-chain based watermarking scheme with superior localization. In: IHW, pp 137–160

  21. Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285:1759–1766

    Article  Google Scholar 

  22. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proceedings of the IEEE special issue on Protection of Multimedia Content:1062–1087. doi:10.1109/5.771066

  23. Hsia CH, Guo JM (2014) Efficient modified directional lifting-based discrete wavelet transform for moving object detection. Signal Process 96(3):138–152. doi:10.1016/j.sigpro.2013.09.007

    Article  Google Scholar 

  24. Hsu C, Hou Y (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44:077003

    Article  Google Scholar 

  25. Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House

  26. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506. doi:10.1016/j.patcog.2008.05.003

    Article  MathSciNet  MATH  Google Scholar 

  27. Li GB, Pei SW, Chen G, Cao W, Wu B (2009) A Self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coe cient. In: Proceedings of the 2009 13th international conference on computer supported cooperative work in design, pp 107–112

  28. Li QH, Ren GQ, Wu QZ, Zhang XY (2013) Rate pre-allocated compression for mapping image based on wavelet and rate-distortion theory. Int J Light Electron Opt 124(14):1836–1840. doi:10.1016/j.ijleo.2012.05.045

    Article  Google Scholar 

  29. Li C, Wang Y, Ma B et al (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Stand Interfaces 34(4):367–379. doi:10.1016/j.csi.2012.01.003

    Article  Google Scholar 

  30. Li C, Zhang A, Liu Z, Liao L, Huang D (2014) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimedia Tools Appl:1380– 7501

  31. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757

    Article  Google Scholar 

  32. Mohan B, Kumar S (2008) A robust digital image watermarking scheme using singular value decomposition. Journal of Multimedia 3(1):7–15

    Article  Google Scholar 

  33. Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385–403. doi:10.1016/S0165-1684(98)00017-6

    Article  MATH  Google Scholar 

  34. Niu SZ, Shu NF (2009) A digital image double watermarking algorithm based on DCT domain. J Comput Res Dev 46(4):6–10

    Google Scholar 

  35. Phadikar A, Maity S, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23:454–466

    Article  Google Scholar 

  36. Peng Z, Liu W (2008) Color image authentication based on spatiotemporal chaos and svd. Chaos Solitons Fractals 36(4):946–952

    Article  Google Scholar 

  37. Rawat S, Raman B (2011) A chaos-based robust watermarking algorithm for rightful ownership protection. International Journal of Image and Graphics 11(4):471–493

    Article  MathSciNet  Google Scholar 

  38. Rawat S, Raman B (2013) Visual-cryptography-based blind watermarking scheme for copyright protection. In: International Journal of Signal and Imaging Systems Engineering, vol 6, no 3, pp 158–163

  39. Singh P, Agarwal S (2015) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimedia Tools and Applications. doi:10.1007/s11042-015-2736-9

    Google Scholar 

  40. Tsai MJ, Chien C (2008) Authentication and recovery for wavelet-based semifragile watermarking. Opt Eng 47(6):19

    Article  MathSciNet  Google Scholar 

  41. Wang M, Chen W (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards Interfaces 31:757–762

    Article  Google Scholar 

  42. Young DP, Ferryman JM (2005) PETS Metrics: On-Line Performance Evaluation Service. In: Proceedings 2nd Joint IEEE International Workshop on VSPETS, Beijing

  43. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, P., Agarwal, S. A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multimed Tools Appl 76, 6389–6428 (2017). https://doi.org/10.1007/s11042-015-3198-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3198-9

Keywords

Navigation