Skip to main content
Log in

A multipurpose image watermarking scheme for digital image protection

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

A multipurpose digital image watermarking scheme is proposed based on the multiple LSB bit substitution method. Fragile and robust watermarks are embedded into the host image for tamper and ownership detection respectively. Randomized insertion is used to insert a fragile watermark pattern to get better tamper detection. Secret keys are used in this scheme to secure data from forged/unauthorized access, which must be known to the end user to extract the watermark from the host. Tampering is done at random locations to cover most of the watermarked image’s area during testing of proposed scheme. Due to blind nature and randomized watermark insertion, high security is obtained. Experimental outcomes represent that the proposed method is able to achieve significant tamper detection. Proposed scheme exhibits robust nature towards common signal processing attacks and provides distortion-less robust watermark in case of no attack. This method also exhibits less execution time due to its time domain insertion methodology. A comparative analysis with the existing schemes shows that the proposed scheme has many features simultaneously such as blind extraction, high embedding capacity, low execution time, significant robustness, acceptable imperceptibility, and multipurpose nature. The proposed scheme can be utilized in fields where rapid response, ownership protection, and tamper detection are prime concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. https://www.dicomlibrary.com/meddream/md5/index.html?study=1.2.826.0.1.3680043.8.1055.1.20111103111148288.98361414.79379639.

  2. https://www.dicomlibrary.com/meddream/md5/index.html?study=1.2.826.0.1.3680043.8.10551.20111102150758591.92402465.76095170.

References

  • Al-Haj A, Abdel-Nabi H (2017) Digital image security based on data hiding and cryptography. In: 2017 3rd International conference on information management (ICIM), pp 437–440. IEEE, 21 Apr 2017

  • Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process 94:545–556

    Article  Google Scholar 

  • Al-Otum HM (2014) Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J Vis Commun Image Represent 25(5):1064–1081

    Article  Google Scholar 

  • An L, Gao X, Li X, Tao D, Deng C, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598–3611

    Article  MathSciNet  Google Scholar 

  • Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236

    Article  Google Scholar 

  • Ansari IA, Pant M, Ahn CW, Jeong J (2015) PSO optimized multipurpose image watermarking using SVD and chaotic sequence. In: Gong M, Linqiang P, Tao S, Tang K, Zhang X (ed) Bio-inspired computing-theories and applications. Springer, Berlin, pp 1–17

    Google Scholar 

  • Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76(17):18001–18025

    Article  Google Scholar 

  • Benrhouma O, Hermassi H, Belghith S (2015) Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dyn 79(3):1817–1833

    Article  Google Scholar 

  • Benrhouma O, Hermassi H, El-Latif AAA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718

    Article  Google Scholar 

  • Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: Engineering in medicine and biology society, 2006, EMBS’06. 28th Annual international conference of the IEEE, pp 4691–4694. IEEE, 30 Aug 2006

  • Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE J Sel Areas Commun 16(4):587–593

    Article  Google Scholar 

  • Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043004

    Article  Google Scholar 

  • Ghazvini M, Hachrood EM, Mirzadi M (2017) An improved image watermarking method in frequency domain. J Appl Secur Res 12(2):260–275

    Article  Google Scholar 

  • Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732

    Article  Google Scholar 

  • Gou H, Swaminathan A, Wu M (2007) Noise features for image tampering detection and steganalysis. In: IEEE international conference on image processing, 2007. ICIP 2007, vol 6, p VI-97. IEEE, 16 Sept 2007

  • Kiani S, Moghaddam ME (2011) A multi-purpose digital image watermarking using fractal block coding. J Syst Softw 84(9):1550–1562

    Article  Google Scholar 

  • Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  Google Scholar 

  • Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4743-5

    Article  Google Scholar 

  • Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  • Lu CS, Liao HY (2001) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579–1592

    Article  Google Scholar 

  • Lu ZM, Skibbe H, Burkhardt H (2005a) Image retrieval based on a multipurpose watermarking scheme. In: International conference on knowledge-based and intelligent information and engineering systems pp 573–579. Springer, Berlin, 14 Sept 2005

  • Lu ZM, Xu DG, Sun SH (2005b) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process 14(6):822–831

    Article  Google Scholar 

  • Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193

    Article  Google Scholar 

  • Madhour H, Sfaxi MA, Forte MW, Helie SG (2006) Ownership detection and protection for learning objects. In: 6th International conference on advanced learning technologies, 2006, pp 784–788. IEEE, 5 Jul 2006

  • Muller N, Baten S (1995) Image processing based navigation with an autonomous car. In: Proceedings of the international conference intelligent autonomous systems, vol 4, pp 591–598, Mar 1995

  • Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans Circuits Syst Video Technol 18(4):497–509

    Article  Google Scholar 

  • Peng Y, Lan H, Yue M, Xue Y (2018) Multipurpose watermarking for vector map protection and authentication. Multimed Tools Appl 77(6):7239–7259

    Article  Google Scholar 

  • Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-Int J Electron Commun 65(7):658–663

    Article  Google Scholar 

  • Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 29:44–52

    Article  Google Scholar 

  • Saiyyad MA, Patil NN (2014) Authentication and tamper detection in images using dual watermarking approach. In: 2014 3rd International conference on reliability, infocom technologies and optimization (ICRITO) (Trends and Future Directions), pp 1–5. IEEE, 8 Oct 2014

  • Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  • Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Inform 5(3):607–614

    Article  Google Scholar 

  • Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digit Signal Process 38:77–94

    Article  Google Scholar 

  • Zeng W, Liu B (1999) A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans Image Process 8(11):1534–1548

    Article  Google Scholar 

  • Zhang C, Cheng LL, Qiu Z, Cheng LM (2008) Multipurpose watermarking based on multiscale curvelet transform. IEEE Trans Inf Forensics Secur 3(4):611–619

    Article  Google Scholar 

  • Zou D, Shi YQ, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Faculty Initiation Grant of PDPM IIITDM Jabalpur, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irshad Ahmad Ansari.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sinhal, R., Ansari, I.A. A multipurpose image watermarking scheme for digital image protection. Int J Syst Assur Eng Manag 11, 274–286 (2020). https://doi.org/10.1007/s13198-019-00855-0

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-019-00855-0

Keywords

Navigation