Skip to main content
Log in

Color image watermarking for content authentication and self-restoration applications based on a dual-domain approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital image watermarking has been witnessed as a powerful tool that can be used in image ownership identification, copyright protection and content authentication applications. In this paper, a dual-domain watermarking scheme for digital image authentication with self-recovery capabilities is proposed. The proposed scheme has a high ability to recover tampered image regions while pertaining high watermarking imperceptibility and high robustness under various types of attacks. The proposed scheme employs two watermarks: 1) content-dependent, and, 2) content-independent, where the content-dependent watermark contains two-bit sequences for authentication and recovery operations. The authentication bits are generated based on the singular value decomposition (SVD) of each block, while the recovery bits are generated from the average value within selected sub-blocks. The independent watermark is embedded using the Discrete Cosine Transform (DCT), whereas, the dependent watermark is embedded directly into the first and second least significant bits (LSB) of the image pixels. The developed dual-domain watermarking scheme has exhibited high robustness performance against various attacks with high imperceptibility and watermarking capacity as well. For authentication purposes, the proposed scheme incorporated three developed measures to detect the authenticity of the probe image, and, to accurately localize tampered regions. The experimental results have shown that the proposed scheme has a high imperceptibility, compared to other existing schemes, and can effectively distinguish malicious from incidental attacks with accurate tampering localization. Moreover, the proposed scheme exhibits high performance against moderate-to-strong incidental attacks such as noise and low-quality JPEG attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Barani MJ, Valandar MY, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205–222

    Article  Google Scholar 

  2. Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110

    Article  Google Scholar 

  3. Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210

    Article  Google Scholar 

  4. Durgesh S, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789. https://doi.org/10.1016/j.jvcir.2016.04.023

    Article  Google Scholar 

  5. Ernawan, F., & Kabir, M. N. (2018). A block-based RDWT-SVD image watermarking method using human visual system characteristics. The Visual Computer, 1-19.

  6. Fan MQ, Wang HX (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process 66:19–29. https://doi.org/10.1016/j.image.2018.04.003

    Article  Google Scholar 

  7. Ghosal SK, Mandal JK (2014) Binomial transform based fragile watermarking for image authentication. Journal of information security and applications 19(4–5):272–281

    Article  Google Scholar 

  8. Hemida, O., & He, H. (2020). A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimedia Tools and Applications, 1-31.

  9. Kalra GS, Talwar R, Sadawarti H (2015) Adaptive digital image watermarking for color images in frequency domain. Multimed Tools Appl 74(17):6849–6869

    Article  Google Scholar 

  10. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  11. Liu XL, Lin CC, Yuan SM (2016) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047–1055

    Article  Google Scholar 

  12. Lu CS, Liao HY (2001) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579–1592

    Article  MATH  Google Scholar 

  13. Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294

    Article  Google Scholar 

  14. Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, Reyes-Reyes R, Sadovnychiy S, Cruz-Ramos C (2020) An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 81:115725

    Article  Google Scholar 

  15. Nematollahi MA, Vorakulpipat C, Rosales HG (2017) Digital watermarking techniques and trends. Springer

  16. Patra, B. and Patra, J.C., (2012), November. Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In intelligent signal processing and communications systems (ISPACS), 2012 international symposium on (pp. 430-435). IEEE.

  17. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327

    Article  Google Scholar 

  18. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  19. Savakar DG, Ghuli A (2017) Non-blind digital watermarking with enhanced image embedding capacity using Meyer wavelet decomposition, SVD, and DFT. Pattern Recognition and Image Analysis 27(3):511–517

    Article  Google Scholar 

  20. Sikder I, Dhar PK, Shimamura T (2017), February. A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In Electrical, Computer and Communication Engineering (ECCE), International Conference on (pp. 881-885). IEEE.

  21. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106

    Article  Google Scholar 

  22. Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process 65:11–25. https://doi.org/10.1016/j.image.2018.03.011

    Article  Google Scholar 

  23. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308

    Article  Google Scholar 

  24. Zhang F, Zhang X (2007) Digital image watermarking capacity and detection error rate. Pattern Recognition Letters 28:1–10. https://doi.org/10.1016/j.patrec.2006.04.020

    Article  Google Scholar 

  25. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Transactions on Information Forensics and Security 6(4):1223–1232

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hazem Munawer Al-Otum.

Ethics declarations

Conflict of interest

Author (Hazem Munawer Al-Otum) declares that he has no conflict of interest.

Author (Mouaz Ibrahim) declares that he has no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Otum, H.M., Ibrahim, M. Color image watermarking for content authentication and self-restoration applications based on a dual-domain approach. Multimed Tools Appl 80, 11739–11764 (2021). https://doi.org/10.1007/s11042-020-10368-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10368-9

Keywords

Navigation