Multimedia Tools and Applications

, Volume 76, Issue 5, pp 6389–6428 | Cite as

A self recoverable dual watermarking scheme for copyright protection and integrity verification

Article
  • 6.1k Downloads

Abstract

Dual watermarking implies embedding of robust as well as fragile watermarks into the same cover image. It facilitates integration of copyright protection and integrity verification into the same scheme. However, most of such existing state of art approaches either lacked the feature of tamper detection and original content recovery or provided an approximation using coarser block level approach. The proposed self recoverable dual watermarking scheme integrates all the aforementioned functionalities of copyright protection, tamper detection and recovery into one scheme. The scheme is independent of the order of embedding of robust and fragile watermarks as these are embedded in different regions of the cover image. It performs tamper detection and recovery, both at the pixel level. The scheme obtains recovery information for each 2×2 image block in just eight bits which are further encoded to only four bits via mapping table. This reduction in recovery bits allows efficient embedding of copyright information which is tested against comprehensive set of attacks. The scheme is found to be robust against noises, filtering, histogram equalization, rotation, jpeg compression, motion blur etc. Besides the normalized cross correlation value, the evaluation of the extracted copyright information is also being done using various objective error metrics based on mutual relation between pixels, their values and locations respectively. The imperceptibility and visual quality of the watermarked as well as recovered image is found to be satisfactorily high. Three major categories of images: natural, texture as well as satellite have been tested in the proposed scheme. Even minute alterations can be chalked out as the detection accuracy rate has been enumerated on pixel basis. The scheme can tolerate tampering ratios upto 50 percent though the visual quality of the recovered image deteriorates with increasing tampering ratio. Comparative results based on normalized cross correlation, probability of false acceptance, probability of false rejection and peak signal to noise ratio metrics validate the efficacy of the proposed scheme over other existing state of art approaches.

Keywords

Self recoverable Dual watermarking Copyright protection Integrity verification Normalized cross correlation (NCC) Probability of false rejection (PFR) Probability of false acceptance (PFA) Peak signal to noise ratio (PSNR) 

References

  1. 1.
    (2013) A blind image copyright protection scheme for e-government. J Visual Communication and Image Representation. 24(7): 1099–1105Google Scholar
  2. 2.
    (2012) A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst Appl. 39(3): 3185–3196Google Scholar
  3. 3.
    (2014) A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimedia Tools Appl. 72(3): 2469–2495Google Scholar
  4. 4.
    (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl. 72(3): 3085–3103Google Scholar
  5. 5.
    (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl. 39(1): 673–689Google Scholar
  6. 6.
    (2012) Copyright Protection for E-Government Document Images. IEEE MultiMedia. 19(3): 62–73Google Scholar
  7. 7.
    Agreste S, Andaloro G (2008) A new approach to pre-processing digital image for wavelet-based watermark. J Comput Appl Math 221(2):274–283MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Chamlawi RA, Khan A (2010) Digital image authentication and recovery: sinteger trans- form based information embedding and extraction. Inf Sci 180:4909–4928CrossRefGoogle Scholar
  9. 9.
    Chemak C, Bouhlel MS, Lapayre JC (2007) A new scheme of robust image watermarking: the double watermarking algorithm. In: Proceedings of the 2007 summer computer simulation conference, pp 1201–1208Google Scholar
  10. 10.
    Chen B, Coatrieux G., Chen G., Sun X, Coatrieux J, Shu H (2014) Full 4-D quaternion discrete Fourier transform based watermarking for color images. Digital Signal Process 28(1):106–119CrossRefGoogle Scholar
  11. 11.
    Chen F, He H, Tai H, Wang H (2012) Chaos-based self-embedding fragile watermarking with exible watermark payload. Multimedia Tools Appl 72:41–56CrossRefGoogle Scholar
  12. 12.
    Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. Elsevier, New YorkGoogle Scholar
  13. 13.
    Cox I, Miller M, Bloom J et al (2001) Digital watermarking. Morgan Kaufmann, BurlingtonGoogle Scholar
  14. 14.
    Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coef?cient correlation. Int J Electron Commun 68(3):244– 53CrossRefGoogle Scholar
  15. 15.
    Feng L, Zheng L, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: Proceedings of the IEEE ICCIST, pp 455–458Google Scholar
  16. 16.
    Gonzalez RC, Woods RE (2001) Digital image processing, 2nd edn. Prentice Hall, Upper Saddle RiverGoogle Scholar
  17. 17.
    Guo J, Liu Z, Liu S (2007) Watermarking based on discrete fractional random transform. Opt Commun 272(2):344–348MathSciNetCrossRefGoogle Scholar
  18. 18.
    Habib M, Sarhan S, Rajab L (2005) A robust-fragile dual watermarking system in the DCT domain. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp 548–553Google Scholar
  19. 19.
    Haiping Lu (2004) Distance-Reciprocal Distortion Measure for Binary Document Images. IEEE Signal Processing Letters 11(2)Google Scholar
  20. 20.
    He HJ, Zhang JS, Tai HM (2008) Block-chain based watermarking scheme with superior localization. In: IHW, pp 137–160Google Scholar
  21. 21.
    Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285:1759–1766CrossRefGoogle Scholar
  22. 22.
    Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proceedings of the IEEE special issue on Protection of Multimedia Content:1062–1087. doi:10.1109/5.771066
  23. 23.
    Hsia CH, Guo JM (2014) Efficient modified directional lifting-based discrete wavelet transform for moving object detection. Signal Process 96(3):138–152. doi:10.1016/j.sigpro.2013.09.007 CrossRefGoogle Scholar
  24. 24.
    Hsu C, Hou Y (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44:077003CrossRefGoogle Scholar
  25. 25.
    Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech HouseGoogle Scholar
  26. 26.
    Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506. doi:10.1016/j.patcog.2008.05.003 MathSciNetCrossRefMATHGoogle Scholar
  27. 27.
    Li GB, Pei SW, Chen G, Cao W, Wu B (2009) A Self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coe cient. In: Proceedings of the 2009 13th international conference on computer supported cooperative work in design, pp 107–112Google Scholar
  28. 28.
    Li QH, Ren GQ, Wu QZ, Zhang XY (2013) Rate pre-allocated compression for mapping image based on wavelet and rate-distortion theory. Int J Light Electron Opt 124(14):1836–1840. doi:10.1016/j.ijleo.2012.05.045 CrossRefGoogle Scholar
  29. 29.
    Li C, Wang Y, Ma B et al (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Stand Interfaces 34(4):367–379. doi:10.1016/j.csi.2012.01.003 CrossRefGoogle Scholar
  30. 30.
    Li C, Zhang A, Liu Z, Liao L, Huang D (2014) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimedia Tools Appl:1380– 7501Google Scholar
  31. 31.
    Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757CrossRefGoogle Scholar
  32. 32.
    Mohan B, Kumar S (2008) A robust digital image watermarking scheme using singular value decomposition. Journal of Multimedia 3(1):7–15CrossRefGoogle Scholar
  33. 33.
    Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385–403. doi:10.1016/S0165-1684(98)00017-6 CrossRefMATHGoogle Scholar
  34. 34.
    Niu SZ, Shu NF (2009) A digital image double watermarking algorithm based on DCT domain. J Comput Res Dev 46(4):6–10Google Scholar
  35. 35.
    Phadikar A, Maity S, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23:454–466CrossRefGoogle Scholar
  36. 36.
    Peng Z, Liu W (2008) Color image authentication based on spatiotemporal chaos and svd. Chaos Solitons Fractals 36(4):946–952CrossRefGoogle Scholar
  37. 37.
    Rawat S, Raman B (2011) A chaos-based robust watermarking algorithm for rightful ownership protection. International Journal of Image and Graphics 11(4):471–493MathSciNetCrossRefGoogle Scholar
  38. 38.
    Rawat S, Raman B (2013) Visual-cryptography-based blind watermarking scheme for copyright protection. In: International Journal of Signal and Imaging Systems Engineering, vol 6, no 3, pp 158–163Google Scholar
  39. 39.
    Singh P, Agarwal S (2015) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimedia Tools and Applications. doi:10.1007/s11042-015-2736-9 Google Scholar
  40. 40.
    Tsai MJ, Chien C (2008) Authentication and recovery for wavelet-based semifragile watermarking. Opt Eng 47(6):19MathSciNetCrossRefGoogle Scholar
  41. 41.
    Wang M, Chen W (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards Interfaces 31:757–762CrossRefGoogle Scholar
  42. 42.
    Young DP, Ferryman JM (2005) PETS Metrics: On-Line Performance Evaluation Service. In: Proceedings 2nd Joint IEEE International Workshop on VSPETS, BeijingGoogle Scholar
  43. 43.
    Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Motilal Nehru National Institute of TechnologyAllahabadIndia

Personalised recommendations