Skip to main content
Log in

Enhancing the robustness of image watermarking against cropping attacks with dual watermarks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 10 January 2020

This article has been updated

Abstract

In this study, a QR-based digital watermarking scheme that can use color images is proposed. The main purpose of this method is to enhance robustness against cropping attacks. To achieve this aim, each bit of the robust watermark has four copies, which are hidden in different image blocks. The embedding rule is designed based on the sinusoidal function, and the wavelength of the sinusoidal function controls the trade-off between imperceptibility and robustness. The four copies of the watermark bit may be inconsistent if the watermarked image undergoes cropping attacks. Therefore, after the four copies of the watermark bit are extracted, the actual value of the watermark bit is judged based on the result of the tampering detection. Experimental results indicate that improving robustness with the help of tampering detection results effectively assists in watermark extraction. In addition, the method is superior to other methods in terms of invisibility, robustness, and embedding payload.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Change history

  • 10 January 2020

    In the original publication, Equation 19 was incorrectly presented. The original article has been corrected.

References

  1. Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743

    Article  Google Scholar 

  2. Shrivastava G, Pandey A, Sharma K (2013) Steganography and its technique: technical overview. Lecture Notes Electr Eng 150:615–620

    Article  Google Scholar 

  3. Parah SA, Sheikh JA, Loan NA, Bhat GM (2017) A robust and computationally efficient digital watermarking technique using inter block pixel differencing. In: Multimedia forensics and security. Springer, Cham, pp 223–252

    Chapter  Google Scholar 

  4. Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Realisation and robustness evaluation of a blind spatial domain watermarking technique. Int J Electron 104(4):659–672

    Article  Google Scholar 

  5. Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic health record hiding in images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2018.02.023

  6. Parah SA, Sheikh JA, Dey N, Bhat GM (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J Glob Inf Manag 25(4):80–102

    Article  Google Scholar 

  7. Hurrah NN, Loan NA, Parah SA, Sheikh JA (2017) A transform domain based robust color image watermarking scheme for single and dual attacks. In: Proceedings of ICIIP, Waknaghat, Shimla, H.P., India, Dec 2017, pp 1–5

  8. Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dynam 93(4):1933–1951

    Article  Google Scholar 

  9. Su Q, Wang G, Zhang X, Lv G, Chen B (2017) An improved color image watermarking algorithm based on QR decomposition. Multimed Tools Appl 76(1):707–729

    Article  Google Scholar 

  10. Hsu CS, Tu SF (2018) Digital watermarking scheme enhancing the robustness against cropping attack. Lecture Notes Electr Eng 464:143–152

    Google Scholar 

  11. Wang D, Yang F, Zhang H (2016) Blind color image watermarking based on DWT and LU decomposition. J Inf Process Syst 12(4):765–778

    Google Scholar 

  12. Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidim Syst Sign Process 29(3):1055–1074

    Article  MathSciNet  Google Scholar 

  13. Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105

    Article  Google Scholar 

  14. Gao J, Fan L, Xu L (2012) Solving the face recognition problem using QR factorization. WSEAS Trans Math 11(8):712–721

    Google Scholar 

  15. Su Q, Niu Y, Wang G, Jia S, Yue J (2014b) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235

    Article  Google Scholar 

  16. Su O, Niu Y, Zou H, Zhao Y, Yao T (2014a) A blind double color image watermarking algorithm based on QR decomposition. Multimed Tools Appl 72(1):987–1009

    Article  Google Scholar 

  17. Subhedar MS, Manbkar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406–422

    Article  Google Scholar 

  18. Naderahmadian Y, Hosseini-Khayat S (2010) Fast watermarking based on QR decomposition in wavelet domain. In: Proceedings of IIH-MSP, Darmstadt, Germany, Oct. 2010, pp 127–130

  19. Schlauweg M, Palfner T, Profrock D, Muller E (2005) The Achilles’ heel of JPEG-based image authentication. In: Proceedings of IASTED CNIS, Phoenix, USA, Nov 2005, pp 1–6

  20. Schlauweg M, Profrock D, Zeibich B, Muller E (2006) Dual watermarking for protection of rightful ownership and secure image authentication. In: Proceedings of MCPS, Santa Barbara, California, USA, Oct 2006, pp 59–66

  21. Shivani S, Singh P, Agarwal S (2017) A dual watermarking scheme for ownership verification and pixel level authentication. In: Proceedings of ICCAE, Sydney, Australia, Feb 2017, pp 131–135

  22. Dube S, Sharma K (2019) Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram. Int J Adv Intell Paradig 13(1/2):43–66

    Article  Google Scholar 

  23. Katzenbeisser S, Petitcolas FAP (2000) Introduction to watermarking techniques. In: Information hiding techniques for steganography and digital watermarking, Artech House, 2000, pp 97–120

  24. Cox IJ, Miller ML, Bloom JA (2002) Analyzing errors. In: Digital watermarking. Morgan Kaufmann Publishers, pp 157–199

  25. University of Granada. (2012). Computer Vision Group. CVG-UGR Image Database. (2012, Oct. 22). Available http://decsai.ugr.es/cvg/dbimagenes/c512.php

  26. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similairty. IEEE T Image Process 13(4):600–612

    Article  Google Scholar 

  27. Wang Y, Cao Y, Zhao X, Zhou L (2017) A prediction mode-based information hiding approach for H. 264/AVC videos minimizing the impacts on rate-distortion optimization. In: Proceedings of IWDW, Magdeburg, Germany, Aug 2017, pp 163–176

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shu-Fen Tu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: Equation 19 was incorrectly presented.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hsu, CS., Tu, SF. Enhancing the robustness of image watermarking against cropping attacks with dual watermarks. Multimed Tools Appl 79, 11297–11323 (2020). https://doi.org/10.1007/s11042-019-08367-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08367-6

Keywords

Navigation