Abstract
Image authentication and restoration is an important area of modern research. In digital photography, copyright protection is very crucial. Visible signatures distract from the meaning of the photograph as well as they are easy to be removed by using advanced softwares. Invisible watermarks provide protection, offer a better look to photographs than visible watermarking, and prevent the photographs from unauthorized manipulations. A robust multiple watermarking scheme is required which could invisibly protect the content and also should survive the manipulations for later verification and restoration. In this paper, a robust and imperceptible multimedia authentication and restoration scheme is proposed. The security of Advanced Encryption Standard (AES) is utilized to make an encrypted watermark. The encrypted watermark is then embedded into photographs in the salient regions by proposed Feature-Closest Point Transform (F-CPT) algorithm. The second watermark is generated by wavelet decomposition and embedded in the second and third level wavelet sub-bands of the cover photographs. Several security attacks are performed e.g. noise attack, compression attack, resizing attack, rotation attack, collage attack, and cropping attack on multiple watermarked photographs to examine the system robustness by normalized cross correlation (NCC) for retrieved authentication watermarks. Result of PSNR, MSE, and SSIM show the high imperceptibility of our technique and aesthetic score (AS) shows the aesthetic quality of watermarked photographs (WPs).
Similar content being viewed by others
References
Ali Al-Haj M (2010) Two spatial watermarking techniques for digital images. In: Advance techniques in multimedia watermarking: image, video, and audio applications. IGI Global Snippet, ch. 1, pp. 2–5
Ali H-M, Abdellatif M, Bourennane E-B (2011) A watermarking of medical image: method based “LSB”. In: Journal of Emerging Trends in Computing and Information Science, vol. 2, no. 12, December, pp. 714-721
Alomari R-S, Al-Jaber A (2004) A fragile watermarking algorithm for content authentication. In: IEEE Trans. JCIS Journal of Computing and Information Science, vol. 2, no. 1, pp. 27–37
Barnes C, Goldman D-B, Shechtman E, Finkelstein A (2011) The patchmatch randomized correspondence algorithm for structural image manipulation. In: Communication of the ACM, vol. 54, issue. 11, November, pp. 103–111
Chamlawi R, Asifullah K, Adris I, Zahid M (2007) A secure semi-fragile watermarking scheme for authentication and recovery of image based on wavelet transform. In: Journal of Computer Science and Technology, vol. 2, no. 6, November, pp. 795–804
Chamlawi R, Asifullah K, Imran U (2010) Authentication and recovery of images using multiple watermarks. In: Computers & Electrical Engineering, vol. 36, issue. 3, May, pp. 578–584
Chamlawi R, Khan A, Idris A (2007) Wavelet based image authentication and recovery. In: Journal of Computer Science and Technology, vol. 22, no. 6, November, pp. 795–804
Christof P, Jan P (2010) Introduction to cryptography and data security. In: Understanding cryptography: a textbook for students and practitioners, reprint. Springer, Germany, ch. 1, sec. 1.1, pp. 2–4
Chuan Q, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. In: Journal of Signal Processing, ACM, vol. 92, issue, 4, April, pp. 1137–1150
Datta R, Joshi D, Li J, Wang J-Z (2006) Studying aesthetics in photographic images using computational approach. In: Proc. of European Conference on Computer Vision (ECCV), May, pp. 288–301
Dobbertin H, Knudsen L, Robshaw M (2005) The cryptanalysis of the AES – a brief survey. In: Advanced encryption standard-AES. Springer, India, vol. 3373, ch. 1, sec. 2, pp. 1–10
Furht B, Kirovski D (2006) Protection of multimedia content in distribution networks. In: Multimedia watermarking techniques and applications. CRC Press, Taylor and Francis Groups, USA, ch. 1, pp. 1–60
Huang W, Ho T-SA, Pankajakshan V (2008) Watermarking-based content authentication of motion-JPEG sequences. In: Proc. of VIE visual information engineering. p. 813–818
Hung K-M, Chen T-W, Su W-K (2012) Automatic image authentication and recovery using multiple watermarks. In: ICIDT information science and digital content technology, vol. 3, June, pp. 730–735
Jeng-Shyang P, Hsiang-Cheh L, Jain LC (2004) Advanced watermarking techniques. In: Intelligent watermarking techniques, 4th ed. World Scientific, USA and London, UK, part 3, ch. 12-18, pp. 351–515
Li C-T, Lou D-C, Liu J-L (2003) Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem. In: Journal of Chinese Institute of Electrical Engineering, vol. 10, no. 1, pp. 99–106
Lin C-Y, Chang S-F (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proc. of SPIE, security and watermarking of multimedia contents, vol. 2971, pp. 140–151
Lin ET, Podilchuk CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proc. of SPIE security and watermarking of multimedia contents, vol. 3971. San Jose, California, January, pp. 23–28
LinP-L, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. In: Journal of Pattern Recognition, ELSEVIER, vol. 38, issue. 12, December, pp. 2519–2529
Pan H-K, Chen Y-Y, Tseng Y-C (2000) A secure data hiding scheme for two-color images. In: Proc. of IEEE Symposium on Computers and Communications, pp. 750–755
Radharani S, Valarmathi M-L (2010) A study on watermarking schemes for image authentication. In: International Journal of Computer Applications, vol. 2, no. 4, June, p. 24–32
Randall A (2011) A novel semi-fragile watermarking scheme with iterative restoration. Available: http://aaronrandall.com/files/WatermarkingPaperLight.pdf (URL)
Rubner Y, Tomasi C, Guibas L-J (2000) The earth mover’s distance as a metric for image retrieval. In: Journal of Computer Vision, vol. 40, no. 2, pp. 99–121
Sathik M-M, Sujatha S-S (2010) An improved invisible watermarking technique for image authentication. In: International Journal of Advanced Science and Technology, vo. 24, November, pp. 61–73
Sencar HT, Ramkumar M, Akansu AN (2004) Communication with side information and data hiding. In: Data hiding fundamentals and applications: content security in digital media. ELSEVIER Academic Press, London, UK, ch. 3, sec. 3.3, pp. 35–39
Shelly GB, Vermaat ME, Quasney JJ, Sebok SL, Jeffrey J (2008) Multimedia and content sharing. In: Discovering computers 2009: complete. Cengage Learning, Boston, USA, ch. 5, sec. ‘Special Features’, pp. 294–297
Shih FY (2012) “Watermarking,” and “Steganography,”. In: Multimedia security: watermarking, steganography, and forensics. CRC Press, Taylor and Francis Group, USA, ch. 2 and ch. 3, pp. 67–181, and pp. 201–215
Sidra R, Lee K-H, Lee S-W (2012) Aesthetic score assessment based on generic features in digital photography. In: AUN/SEED-Net regional conference on information and communication technology, Manila, Philippine, October, pp. 76–79
Somayeh S, Sajjad D, Azizah A-M (2012) Efficient digital image authentication and tamper localization techniques using 3Lsb watermarking. In: IJCSI International Journal Of Computer Science, vol. 9, issue. 1, January, pp. 1–8
Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. In: IEEE Trans. on Circuits and Systems for Video Technology, vol. 19, no. 6, June, pp. 906–910
Tian J (2002) Wavelet-based reversible watermarking for authentication. In: Proc. of SPIE 4675, Security and Watermarking of Multimedia Contents IV, vol. 4675, April, pp. 679–690
Tseng Y-C, Pan H-K (2001) Secure and invisible data hiding in 2 - color images. In: Proc. of IEEE Computer and Communication Societies, vol. 2, pp. 887–896
TsihrintzisGA, Jain LC (2008) Cryptography and data hiding for media security. In: Multimedia services in intelligent environments: advanced tools and methodologies. Springer, Berlin, Germany, ch. 9, sec. 9.1, pp. 227–228
Wu Y, Qiu B, Bao F (2007) Evaluating OUDA’s tamper-localization watermarking scheme. In: Proc. of IEEE Conference on Multimedia and Expo, July, pp. 843–846
Yang H, Sun X (2007) Semi-fragile watermarking for image authentication and tamper detection using HVS model. In: IEEE conference on multimedia and ubiquitous engineering, April, pp. 26–28
Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. In: IEEE Trans. on Multimedia, vol. 10, no. 8, December, pp.1490–1499
Zoran D, Michael J, Sushil J (2005) Information hiding: steganography and steganalysis. In: Handbook of statistics 24: data mining and data visualization. USA: Elsevier, ch. 6, sec. 3, pp. 174–179
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this paper has been presented in 15th International Conference on Advanced Communication Technology (ICACT2013) which was held in Pyeonchang, Korea, January 27–30, 2013, pp. 24–28.
This study was supported by research fund from Chosun University, 2012.
Rights and permissions
About this article
Cite this article
Riaz, S., Lee, SW. A robust multimedia authentication and restoration scheme in digital photography. Multimed Tools Appl 73, 1291–1321 (2014). https://doi.org/10.1007/s11042-013-1592-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1592-8